Identify a true statement about smishing.

a. The phisher sends legitimate-looking messages through phone to acquire personal information.
b. The phisher sends a survey email to obtain the configuration of an unsuspecting user’s computing device.
c. The phisher sends a voice mail message to an unsuspecting user to call a phone number or access a Web site.
d. The phisher sends fraudulent emails to a certain organization’s employees.

a. The phisher sends legitimate-looking messages through phone to acquire personal information.
In a smishing scam, people receive a legitimate-looking text message on their phone telling them to call a specific phone number or to log on to a Web site. This is often done under the guise that there is a problem with their bank account or credit card that requires immediate attention.

Computer Science & Information Technology

You might also like to view...

What is the name of the video editing software developed by Apple?

A. iVideo B. iMovie C. Video Maker D. Movie Maker

Computer Science & Information Technology

The Internet of Things connects wireless identifiable objects ________.

A. with each other  B. to their owners C. with a central server D. all of these

Computer Science & Information Technology