HotelInfantesAgres - Bawat tanong, may sagot. Logo

In Computer Science / Senior High School | 2025-07-01

. Write at least 5 sentences for each Scenario: You are an IT specialist at a company, and you receive an email from an unknown sender with an attachment labeled “Urgent: Confidential Data.” The email looks suspicious. Questions: 1. How can you verify the authenticity of the email? 2. What best practices should you follow to prevent falling victim to phishing attacks? ​

Asked by rozenarroz

Answer (1)

Because this might be a scammer, and will put me in danger.

Answered by teresitarescueta | 2025-07-01