Computer Science for IGCSE & O level - The Internet And Its Uses (Section 2 - No. 39)
Which of the following actions might indicate a phishing attempt?
Receiving an email from a known contact.
Being asked to provide personal information via email.
Clicking on a link to view a legitimate website.
Using a secure connection to enter your credentials.
Explanation
Legitimate organizations rarely request sensitive information through email.
Comments (0)
