Computer Science for IGCSE & O level - The Internet And Its Uses (Section 2 - No. 39)

Which of the following actions might indicate a phishing attempt?
Receiving an email from a known contact.
Being asked to provide personal information via email.
Clicking on a link to view a legitimate website.
Using a secure connection to enter your credentials.

Explanation

Legitimate organizations rarely request sensitive information through email.

Comments (0)

Advertisement