COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____proves that the sender was legitimate and not an imposter
A
Integrity
B
Confidentiality
C
Availability
D
Authenticity
Explanation: 

Detailed explanation-1: -Phishing is a method used to obtain data by faking an email address and sending an email that looks like it is coming from a trusted source that could reasonably ask for such information. The goal is to make victims click on a link or download an attachment that will install malware on their system.

Detailed explanation-2: -"Mailed by” header with the domain name, like google.com. “Signed by” header with the sending domain.

Detailed explanation-3: -The email in question is not from a company domain. You received a verification email for an application, account, email list, etc… that you didn’t sign up for. Spoofed or masked names and/or email addresses. The domain is misspelled. The entire textbox within the email is a hyperlink. More items •04-Nov-2020

Detailed explanation-4: -Legit companies don’t request your sensitive information via email. Legit companies usually call you by your name. Legit companies have domain emails. Legit companies know how to spell. Legit companies don’t send unsolicited attachments. Legit company links match legitimate URLs.

There is 1 question to complete.