1.

With respect to computers, which one of the following best describes phishing?

A. A malicious installed on a system that stays concealed to avoid detection
B. A method of bypassing normal authentication procedures over a connection to a network
C. A type of unsolicited bulk email of identical messages sent to numerous recipients
D. An attempt to acquire sensitive information for malicious reasons by masquerading as a trustworthy entity
Answer» E.


Discussion

No Comment Found