answersLogoWhite

0


Best Answer

its phishing

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of security threat uses email that appears to be from a legimate sender and asks the email recipient to visit a website to enter confidential information?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which of the following must you have to keep information truly confidential?

Privacy and security


Which of the following definitions is true about disclosure and confidential information?

Disclosure and confidential information being leaked causes exceptionally grave damage to national security.


A hacker attempts to reach confidential information that is stored on a server inside the corporate network A network security solution?

A hacker attempts to reach confidential information that is stored on a server inside the corporate network A network security solution?


What could happen if you did not keep information confidential?

If you do not keep information confidential, you could breach trust, damage relationships, harm reputations, and potentially face legal consequences if the information is sensitive or protected. Leakage of confidential information can lead to financial loss, loss of competitive advantage, and compromise on security and privacy.


The types of information that could affect confidentiality and security and how to handle these?

The types of information that could affect confidentiality and security include personal and private, business, and classified or government information. Such information should be labelled as confidential and should be safeguarded accordingly.


The types of information that could affect confidentiality and security and how to handle?

The types of information that could affect confidentiality and security include personal and private, business, and classified or government information. Such information should be labelled as confidential and should be safeguarded accordingly.


Can a mother change social security number of child to pervent father from obtaining it?

No, no, no, no and no! Personal information of the child and the parent is confidential.


Which type of security threat can be transferred through email an is used to gain sensitive information by recording the keystrokes of the email recipient?

grayware


How do you hack gmail or Hotmail 2013?

Hacking gmail or hotmail is not legal. You can face cyber security charges for doing that. They contain confidential information.


Why should database be protected?

Database contains data which might be confidential. Data in any organization is confidential. To prevent confidentiality of the firm security need to be implemented.So that information can not be stolen.


Why is row-level security more valuable to an HRIS than a manufacturing software solution?

HRIS information is confidential. Any single employee should be able to view his/her information but not information of other employees


Is the date of birth confidential?

Most Date-of-Births can be found with a simple google search, so no. A social security number would be a better example of confidential information. Only the people you allow to have that number, or the people who steal it, have access to it.