1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
14

Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work

and that they therefore need the user ID and password for her account. Tanya suspects that it is a phishing attempt.
Computers and Technology
1 answer:
Alecsey [184]3 years ago
5 0
Phishing is a type of social engineering attack that is used to steal a vicitm's credentials. Making a fake email is probably one of the most effective phishing attacks against commercial enterprises. It always baffles me how people can fall for it!

Yes, that email is a phishing attempt...They should call the bank to verify. 

The best way to tell is by looking at who sent you the email and who is CC'd to it. Also, the title of the email might be a dead giveaway...
You might be interested in
What are the four different orchestral instrument families?
natka813 [3]

Answer:

Gutair

Violen

cello

Double Brass

Harp

Explanation:

7 0
3 years ago
Read 2 more answers
Plz can someone tell me the answers ?
Ganezh [65]

Answer:

you can

Explanation:

you can

5 0
2 years ago
Read 2 more answers
Variables make it easier to do what?
defon
<span>D. Make changes to your code
Variables allow the ability to easily substitute numbers for other numbers.
</span>
8 0
3 years ago
To join a social network you create an avatar true or false
svp [43]
False because not all social media webstites provide avatars
7 0
3 years ago
Read 2 more answers
I need help with the code practice 9.2 Edhesive.<br><br> Thank you
antiseptic1488 [7]

Answer:

you talking about anaconda navigation? i would love to help!

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Why computers are called "COMPUTER"?
    12·1 answer
  • You are configuring two switches of different vendors such that they connect to each other via a single link that will carry mul
    13·1 answer
  • Which extensions can help drive installs of your mobile app?
    12·1 answer
  • C - Language Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. E
    12·1 answer
  • Which of the following statements is used to terminate the program when closing the frame?
    5·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • NumA = 3 <br>numB = 2<br>Result = numA ** numB
    12·1 answer
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
  • Select the skill that matches the following definition.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!