. Write at least 5 sentences for each Scenario: You are an IT specialist at a company, and you receive an email from an unknown sender with an attachment labeled “Urgent: Confidential Data.” The email looks suspicious. Questions: 1. How can you verify the authenticity of the email? 2. What best practices should you follow to prevent falling victim to phishing attacks?
Asked by rozenarroz
Answer (1)
Because this might be a scammer, and will put me in danger.