1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
2 years ago
6

which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca

rd. keep photocopies of each side of your credit card in a secure place at home. never give out credit information to someone who calls you or emails you. shred personal mail and documents before throwing away.
Computers and Technology
1 answer:
snow_lady [41]2 years ago
6 0

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

You might be interested in
Which operating system became obsolete with the arrival of more advance graphical user interfaces
jarptica [38.1K]
MS-DOS. MS-DOS stands for Microsoft Disk Operating System. It was the first widely installed operating system for personal computers but became obsolete with the arrival of more advanced graphical user interfaces such as MAC OS developed by Apple, Inc.

Good Luck!
8 0
3 years ago
To close a window in Windows 10, you can _____. Select all that apply. A. right-click its button on the taskbar, then click Clos
Nookie1986 [14]

Answer:

A, B and C

Explanation:

A, B and C

(The following is unrelated to the answer just to fill the letters criteria)

3 0
4 years ago
Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per
BARSIC [14]

Answer:

TACACS+

Explanation:

TACACS+ or terminal access controller access-control system plus is an open standard protocol developed by Cisco. It encrypts all communication in a network ( including the password and data sent) and supports a separate authentication, authorisation and accounting policies for access to a centralised database.

It also uses the transport layer protocol TCP for a reliable data communication.

6 0
4 years ago
when water is poured into a styrofoam cup, nothing happens. the water stays in the cup and it can be used for drinking. however,
KengaRu [80]

The backside of the cup disappears and the fuel pours out due to the fact styrofoam is a trading name for polystyrene (PS) foams, Gasoline is crafted from a mixture of hydrocarbons, so it dissolves PS, generating a viscose paste.

Gasoline is crafted from a combination of volatile, flammable liquid hydrocarbons derived from petroleum and used as gas for internal-combustion engines. It is likewise used as a solvent for oils and fats. Gasoline is a form of gas crafted from crude oil and different petroleum liquids. Gasoline is mostly used as an engine gas in vehicles.

Learn more about gasoline at brainly.com/question/28762820

#SPJ4

3 0
2 years ago
What do the Sikh people wear on their head?
Mama L [17]

Answer:

Explanation:

It is called "Turban"

Sikhs wear the turban, to take care of the hair, promote equality, and preserve the Sikh identity

4 0
3 years ago
Read 2 more answers
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • 1. Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
    15·2 answers
  • What happens to the data in rom when the power is turned off?
    10·1 answer
  • 4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
    6·1 answer
  • The general who directed the project responsible for the "Fat Man” graduated from what alma mater in 1918? Hint: W___ P____.
    10·1 answer
  • Memory management is concerned with __________.
    14·1 answer
  • This program will convert a set of temperatures from Fahrenheit to Celsius and Kelvin. Your program will be reading in three dou
    11·1 answer
  • What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnet
    6·1 answer
  • Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a ca
    6·1 answer
  • Which of the following is an example of effective nonverbal communication?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!