Computer Science for IGCSE & O level - The Internet And Its Uses (Section 17 - No. 9)
Which of the following methods can be used to mitigate the risk of phishing attacks?
Clicking on suspicious links
Opening attachments from unknown senders
Verifying the sender's email address
Ignoring security warnings
Explanation
Verifying the sender helps in identifying phishing attempts.
Comments (0)
