An organization receives an email that provides instruction on how to protect a system from being a target of new malware that is rapidly infecting systems. The incident response team investigates the notification and determines it to invalid and notifies users to disregard the email. Which of the following Best describes this occurrence?

A. Phishing
B. Scareware
C. SPAM
D. Hoax

Answer: D. Hoax

Computer Science & Information Technology

You might also like to view...

________ is a risk-based strategic assessment and planning technique used primarily for security but which also can be used for disaster recovery planning purposes

A) Asset-based Risk Assessment B) Business Impact Analysis C) Disaster-based Risk Assessment D) OCTAVE

Computer Science & Information Technology

The size or _______of most output devices is typically expressed in terms of pixels.

A. resolution B. clarity C. density D. scale

Computer Science & Information Technology