Select an option above to see an explanation here.
A) A phishing attack uses fraudulent emails or websites to trick users into revealing sensitive information, such as an email claiming to be from a bank.
B) A software update containing hidden malware is an example of a malware attack, not phishing.
C) A stolen laptop containing sensitive client information is a physical security breach, not phishing.
D) A firewall blocking unauthorized network traffic is a cyber security measure, not a phishing attack.