Asked by ChengLin Jiang on Jun 30, 2024

verifed

Verified

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.

A) worm
B) trojan horse
C) phishing attack
D) denial of service attack

Phishing Attack

A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.

Sensitive Information

Data that must be protected from unauthorized access or disclosure, including personal data, financial information, and other types of information classified as confidential.

Email

A method of exchanging digital messages over the Internet, using specific protocols for communication between senders and recipients.

  • Learn about the approaches used in carrying out cyber attacks, like phishing, DDoS, and taking advantage of the Internet of Things.
verifed

Verified Answer

HA
Haseeb AhmadJul 03, 2024
Final Answer :
C
Explanation :
This is an example of a phishing attack, where the attacker pretends to be a trustworthy entity in an email or other communication to steal sensitive information such as passwords, credit card numbers, or bank account details.