What is a phishing attack and how is it commonly carried out?
A.
Identity theft scheme that takes place through e-mail and a bogus Web site.
B.
Financial attack that takes place through man-in-the-middle attacks.
C.
Social engineering attack that takes place through war dialing.
D.
Credential stealing that takes place through trusted paths.
Explanation:
Phishing attacks usually take place through e-mail schemes requesting users to disclose personal or financial information for identity theft purposes. The e-mail usually appears to come from a legitimate corporation asking the person to update their account information or threatening to terminate accounts. The e-mail contains a link that brings the users to a Web site that looks like the official site.