I can’t see the following tags that he could’ve possibly used
Port blocking would be a suitable term. It can apply to both TCP and UDP, but not IP. IP is the lower common layer that doesn't have the concept of a port.
Answer:
jgiofhkjufihojsfguisjkdghsufijk
Explanation:
eafijbuiaoehfkjhadufyhbjadnifujkhmadjnigjkmhadfngkjadhmfj
Answer:
<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>
Explanation:
The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.