12 Questions
What is pharming?
When an unauthorized user redirects internet traffic intended for a legitimate server towards a fake one
How does pharming trick users into giving away their personal details?
By diverting users to a fake website that looks like the legitimate one
What is one common technique used in pharming?
Domain Name Server (DNS) cache poisoning
How do unauthorized users often hide malicious code used in pharming?
In an email attachment or link
What can be done to prevent pharming attacks?
Have a firewall installed and operational
What is the purpose of the malicious code used in pharming?
To redirect users to a fake website and steal personal data
Pharming involves installing malicious code on a person's hard drive or server.
True
The fake website created in pharming is designed to look different from the legitimate one.
False
Pharming often involves exploiting vulnerabilities in the Domain Name Server (DNS).
True
Unauthorized users often hide the malicious code used in pharming in email attachments or links.
True
Having a firewall installed and operational can help prevent pharming attacks.
True
Pharming is a technique used to redirect internet traffic intended for a legitimate server toward a fake one instead.
True
Study Notes
- Pharming refers to an unauthorized user installing malicious code to redirect users to fake websites, collecting personal details entered into the fake site.
- Malicious code can be installed via email attachments or links.
- Fake websites designed to resemble legitimate ones to trick users into providing personal data.
- DNS cache poisoning: a technique used in pharming to exploit vulnerabilities in the DNS and divert traffic to a fake server.
- Precautions to prevent pharming include: having a firewall installed and operational, in addition to being cautious with email attachments and links.
Test your knowledge about pharming, a technique where unauthorized users install malicious code to redirect users to fake websites. This quiz explores the concept of pharming and its implications for internet security.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free