COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If you receive a suspicious email, you should
A
open it up and click on any links.
B
reply to the sender asking them to leave you alone.
C
delete the email without opening it.
D
delete your email account.
Explanation: 

Detailed explanation-1: -Do not open it. In some cases, the act of opening the phishing email may cause you to compromise the security of your Personally Identifiable Information (PII). Delete it immediately to prevent yourself from accidentally opening the message in the future.

Detailed explanation-2: -If you receive a spam email, you should delete it immediately-do not open any attachments or click any links. It only takes one wrong click, and hackers can gain access to your entire computer. The tips below will help you better protect yourself when using email. Phishing emails are one type of email scam.

Detailed explanation-3: -The good news is that opening a suspicious email, while not ideal, is relatively harmless. Spam emails only become a serious cyber threat if you’ve committed any of the following actions: Downloaded any malicious files or email attachments.

Detailed explanation-4: -Can phishing emails disappear? Yes. In some instances, an email sent with a special type of distribution management tool can disappear from an individual’s inbox after a specified duration of time. Alternatively, the email may still be in the inbox and yet the spammer may have altered it.

Detailed explanation-5: -Never click any links or attachments in suspicious emails. If the suspicious message appears to come from a person you know, contact that person via some other means such as text message or phone call to confirm it. Report the message (see below). Delete it.

There is 1 question to complete.