Which action is a recommended response when you suspect a phishing attempt?

Gain expertise for the Broward College Computer Literacy Exam. Study with multiple choice questions and flashcards, each providing hints and explanations. Ace your exam!

Multiple Choice

Which action is a recommended response when you suspect a phishing attempt?

Explanation:
When you suspect phishing, the safest move is to verify the message through trusted channels. Don’t click any links or provide any credentials in response, because those actions can give attackers access or install malware. Instead, use contact methods you know are legitimate—such as calling the organization using a phone number from their official website, or logging in through the site you normally use (not via a link in the message) or through your company’s security portal. This helps you confirm whether the message is real before taking any action, and you can report it if it’s phishing. The other actions would put you at risk: clicking a link could lead to a fraudulent site, forwarding it to others could spread the scam, and replying with a password would hand sensitive information to attackers. Verifying through trusted channels keeps your information safe and helps security teams address the threat.

When you suspect phishing, the safest move is to verify the message through trusted channels. Don’t click any links or provide any credentials in response, because those actions can give attackers access or install malware. Instead, use contact methods you know are legitimate—such as calling the organization using a phone number from their official website, or logging in through the site you normally use (not via a link in the message) or through your company’s security portal. This helps you confirm whether the message is real before taking any action, and you can report it if it’s phishing.

The other actions would put you at risk: clicking a link could lead to a fraudulent site, forwarding it to others could spread the scam, and replying with a password would hand sensitive information to attackers. Verifying through trusted channels keeps your information safe and helps security teams address the threat.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy