FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Working at your desk, you’ve received an email from Microsoft explaining that your password it out of date, and you must set a new one. The link within the email will guide you through it. Your next step is?
A
Follow the link and reset password.
B
Ignore the email and delete it.
C
Reset your password manually.
D
None of the above
Explanation: 

Detailed explanation-1: -Unexpected or suspicious email attachments should never be opened. They may execute a disguised program (malware, adware, spyware, virus, etc.) that could damage or steal your data. If in doubt, call the sender to verify.

Detailed explanation-2: -For example: The user is redirected to myuniversity.edurenewal.com, a bogus page appearing exactly like the real renewal page, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on the university network.

Detailed explanation-3: -Which of the following is an example of a “phishing” attack? Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Detailed explanation-4: -If you got a phishing email, forward it to the Anti-Phishing Working Group at reportphishingapwg.org . If you got a phishing text message, forward it to SPAM (7726). Report the phishing attempt to the FTC at ReportFraud.ftc.gov.

There is 1 question to complete.