Which of the following is an example of a phishing attack?

Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information

Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information

Flooding a user’s computer with e-mail requests in order to cause the computer to crash

Flooding a user’s computer with e-mail requests in order to cause the computer to crash

Gaining remote access to a user’s computer in order to steal user IDs and passwords

Gaining remote access to a user’s computer in order to steal user IDs and passwords

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

Respuesta :

Answer:

Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information

Explanation:

A phishing attack is when a cybercriminal sends fraudulent emails or messages to trick individuals into providing sensitive information such as usernames, passwords, credit card numbers, or personal details. These emails often appear to come from a legitimate source, such as a bank, government agency, or popular website, and may contain a link that leads to a fake website designed to look like the real one. Once the victim enters their information on the fake website, the attacker can then use that information for malicious purposes, such as identity theft or financial fraud. Phishing attacks rely on social engineering tactics to manipulate people into divulging confidential information.