Asked by ChengLin Jiang on Jun 30, 2024
Verified
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.
A) worm
B) trojan horse
C) phishing attack
D) denial of service attack
Phishing Attack
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Sensitive Information
Data that must be protected from unauthorized access or disclosure, including personal data, financial information, and other types of information classified as confidential.
A method of exchanging digital messages over the Internet, using specific protocols for communication between senders and recipients.
- Learn about the approaches used in carrying out cyber attacks, like phishing, DDoS, and taking advantage of the Internet of Things.
Verified Answer
Learning Objectives
- Learn about the approaches used in carrying out cyber attacks, like phishing, DDoS, and taking advantage of the Internet of Things.
Related questions
The Goal of Whaling Is to Trick A(n) _______ into ...
Dyn's Hackers Formed a Botnet from _________ ...
Dyn Is a Cloud-Based Internet Performance Management Company That Provides ...
Phishing Emails Are Disguised as Emails from a Trusted Source ...
Andrew's Company Uses a Special Email Program for Communicating Within ...