Computer Science for IGCSE & O level - The Internet And Its Uses (Section 1 - No. 31)
Which of the following is a characteristic of a phishing attack?
Uses a strong firewall.
Involves a trusted source.
Involves a legitimate website.
Uses deception to get private information.
Explanation
Phishing uses deception to steal information.
Comments (0)
