Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?
A.
Hacking
B.
Phishing
C.
Spam
D.
Cracking
Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?
Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?
A.
Hacking
B.
Phishing
C.
Spam
D.
Cracking