Difficulty: Easy
Correct Answer: Phishing scams
Explanation:
Introduction / Context:
This question is from cyber security awareness and deals with a common online threat. Many users receive emails, messages or fake websites that try to trick them into revealing passwords, bank details or other sensitive information. The process of pretending to be a trustworthy entity to steal such data has a specific name that appears frequently in security warnings, banking advisories and competitive exam questions. Recognising this term is key to understanding online safety instructions.
Given Data / Assumptions:
Concept / Approach:
The practice of sending fraudulent messages that appear to come from reputable sources in order to trick individuals into disclosing personal information is called phishing. A phishing scam often uses fake emails, SMS messages or websites that closely resemble genuine ones, encouraging users to click links or enter login details. Computer viruses, spyware and hacking are related concepts, but they describe different technical mechanisms such as self replicating code, hidden monitoring programs or direct system intrusion. The important clues in the question are obtaining confidential information and falsifying identity, which together describe phishing scams most accurately.
Step-by-Step Solution:
Verification / Alternative check:
Banks, payment apps and email providers regularly send awareness messages warning users about phishing scams. They advise users never to click on suspicious links or share OTP, PIN or passwords in response to emails or calls. Cyber security websites classify phishing as a major type of social engineering attack. In contrast, computer viruses are defined as malicious programs that replicate and spread, and spyware is code that secretly monitors user activity. Because the question focuses on fraudulent identity and asking for information rather than on code, existing definitions confirm that phishing scams is the correct answer.
Why Other Options Are Wrong:
Common Pitfalls:
Some learners confuse phishing with general viruses because both are cyber threats. Others may focus on spyware, since that also steals data. The key difference is the method used. Phishing relies on deception through communication, asking the victim to voluntarily type or send confidential information. Malware such as viruses and spyware is code that directly runs on the system. When a question emphasises falsifying identity and direct requests for confidential information, phishing scams should be your first thought.
Final Answer:
Attempts to obtain confidential information by faking identity are called Phishing scams.
Discussion & Comments