Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?

Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information?

A.
Hacking

B.
Phishing

C.
Spam

D.
Cracking



Leave a Reply 0

Your email address will not be published. Required fields are marked *