Question:

Match List - I with List - II.
List - IList -II
(A) Phishing(I) Code redirects user to fake website without user knowing
(B) Spyware(II) Alters or deletes data

(C) Pharming(III) Fake email replicates well known organization
(D) Viruses(IV) Monitors information by monitoring key presses on a user's keyboard
Choose the correct answer from the options given below:

Updated On: Sep 12, 2024
  • (A)-(III), (B)-(IV), (C)-(I), (D)-(II)
  • (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
  • (A)-(II), (B)-(I), (C)-(III), (D)-(IV)
  • (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is A

Solution and Explanation

The correct option is(A): (A)-(III), (B)-(IV), (C)-(I), (D)-(II)
Was this answer helpful?
0
0