(ISAC) International Society for the Advancement of Cytometry Practice Test
(ISAC) International Society for the Advancement of Cytometry ISAC Cyber Threats and Vulnerabilities
Which of the following is an example of a phishing attack?
Select your answer
A
Sending a fraudulent email that mimics a trusted organization to steal login credentials
B
Infecting a system with a virus that corrupts data
C
Breaking into a network using stolen credentials
D
Overloading a server with excessive traffic
Need a hint?
(H)