Q. Which of the following statements best describes “Deep fake”?
Answer: A
Notes:
- Statement b is incorrect– It is referring to Trojan. It acts like a legitimate application or file and tricks the user. It seeks to deceive the user into loading and executing the malware on their device and once installed it can take control of the computer.
- Statement c is incorrect– Denial of service attacks(DDos) are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources.
- Statement d is incorrect– Identity theft occurs when someone uses another person’s personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
Source- https://epaper.thehindu.com/Home/ShareArticle?OrgId=GPU9DKN77.1&imageview=0

