Q.6
Cyber Law Medium Knowledge-Based
Bare Act Information Technology Act, 2000 · Section 66C, 66D

An attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as:

A Pharming
B Smishing
Phishing Answer
D Diding
📋

Explanation & Strategy

Click any section to expand · only one open at a time

Phishing is the fraudulent attempt to acquire sensitive information (usernames, passwords, credit card details) by disguising as a trustworthy entity in electronic communication. It is a form of social engineering attack and a cyber crime under the IT Act.

At a Glance
Subject Cyber Law
Difficulty Medium
Act Information Technology Act, 2000
Section Section 66C, 66D
Answer (C) Knowledge-Based
Paper AIBE XV — January 2021
Progress in Paper
Q.6 100 questions

6% through paper