Ask Question
27 February, 07:34

Which statement is true of phishing?

a.

It consists of self-propagating program code that is triggered by a specified time or event.

b.

It prevents the disclosure of information to anyone who is not authorized to access it.

c.

It involves sending fraudulent e-mails that seem to come from legitimate sources.

d.

It involves monitoring and recording keystrokes.

+4
Answers (2)
  1. 27 February, 07:57
    0
    C) It involves sending fraudulent e-mails that seem to come from legitimate sources.

    Explanation:

    It seems like criminals are always one step ahead of law enforcement, and phishing and other internet scams are just an example. Phishing is a scam technique were people receive emails from supposedly legit sources, but they aren't. They offer different things, from great sales promotions to huge financial opportunities (like the Nigerian inheritance scam of a few years ago).

    Their intention is that you basically open the email or hit a link, and then the scammers will try to steal your personal information (identity theft) in order to empty your bank accounts or purchase goods or services and charge them to you.

    It is called phishing because hackers actually pretend to fish a few victims out of an ocean of users. Emails acts as the bait and hackers will wait for someone to bite it.
  2. 27 February, 07:59
    0
    C, involves sending fraudulent e-mails that seem to come from legitimate sources

    Explanation:

    Phishing is a cybercrime in which an individual sends e-mails to potential victims in such a legitimate way and approach in other to gather information about the potential victim.

    Phishing has bee one of the ways through which cyber fraud has become widespread in the world today.

    A potential vitims of phishing has an e-mail sent to him/her as though it were legitimate and unsuspecting persons act on the mail and hence give out theri information. the information could be financial, personal, marital, etc; just about anything the cybercriminal wants to know about his potential victim.

    The gathered information is either sold to another person or used to harm the potential victim

    Cheers.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Which statement is true of phishing? a. It consists of self-propagating program code that is triggered by a specified time or event. b. It ...” in 📗 Business if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers