What are phishing attacks?
(a) Users are forced to use a second server which causes the attack
(b) Users are forced to divert to a fake site where the attack takes place
(c) Users are fooled by similar GUI and data is extracted from them.
(d) None of the mentioned
I had been asked this question in a national level competition.
The origin of the question is Application Security in chapter Application Design and Development of RDBMS