Computer Science for IGCSE & O level - The Internet And Its Uses (Section 1 - No. 31)

Which of the following is a characteristic of a phishing attack?
Uses a strong firewall.
Involves a trusted source.
Involves a legitimate website.
Uses deception to get private information.

Explanation

Phishing uses deception to steal information.

Comments (0)

Advertisement