Answer:
Individuals can verify the legitimacy of emails requesting sensitive information by contacting the sender directly using a trusted and known method.
Individuals can verify the legitimacy of emails requesting sensitive information by contacting the sender directly using a trusted and known method.
You may be interested in:
Web Security MCQs