Q. Which of the following statements best describes “Deep fake”?

[A] It refers to a video that has been edited using an algorithm to replace the person in the original video with someone else, in a way that makes the video look authentic.

[B] It is a type of malicious software that looks legitimate but can take control of the computer without notice of the user.

[C] It is an attempt to make an online service unavailable and take the network down by overwhelming the site with traffic.

[D] It refers to a situation when someone uses another person personal identifying information without their permission to commit fraud or other crimes.

Answer: A
Notes:
  • Statement b is incorrect– It is referring to Trojan. It acts like a legitimate application or file and tricks the user. It seeks to deceive the user into loading and executing the malware on their device and once installed it can take control of the computer. 
  • Statement c is incorrect– Denial of service attacks(DDos) are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources.  
  • Statement d is incorrect– Identity theft occurs when someone uses another person’s personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. 

Source- https://epaper.thehindu.com/Home/ShareArticle?OrgId=GPU9DKN77.1&imageview=0 

Blog
Academy
Community