header bg


Which of the following are true statements regarding the identification of phishing attempts if phishing e-mail attacks have caused severe harm to a company and the security office decides to provide training to all users in phishing prevention? (select all that apply.)

A Ensure e-mail is from a trusted, legitimate e-mail address source.

Phishing e-mails can be identified by the sender, the recipient, spelling and grammatical problems, and unfamiliar or harmful attached links.