If you suspect phishing, which action is recommended?

Study for the DSAC-11 Annex C Test with real-time quizzes and multiple-choice questions. Each question offers hints and explanations to enhance your preparedness. Boost your confidence and ensure success in your DSAC-11 Annex C exam!

Multiple Choice

If you suspect phishing, which action is recommended?

Explanation:
When you suspect phishing, verify the sender through official channels before taking any action. Phishing relies on pretending to be someone you trust, so the safest move is to confirm who sent the message using a method you know is legitimate—such as contacting the organization with a phone number or website you’ve used before, or signing into your account through the official app or site rather than the links in the message. In practice, don’t click any links or open attachments, and don’t enter passwords or other sensitive information in response to the message. If you’re unsure, reach out through a trusted channel, or navigate to the official site by typing the address yourself. If you determine the message is suspicious, report it to IT/security and delete it. Choosing to verify instead of acting on the message protects you from credential theft and malware, and it’s safer than simply ignoring, which could cause you to miss important legitimate communications.

When you suspect phishing, verify the sender through official channels before taking any action. Phishing relies on pretending to be someone you trust, so the safest move is to confirm who sent the message using a method you know is legitimate—such as contacting the organization with a phone number or website you’ve used before, or signing into your account through the official app or site rather than the links in the message.

In practice, don’t click any links or open attachments, and don’t enter passwords or other sensitive information in response to the message. If you’re unsure, reach out through a trusted channel, or navigate to the official site by typing the address yourself. If you determine the message is suspicious, report it to IT/security and delete it.

Choosing to verify instead of acting on the message protects you from credential theft and malware, and it’s safer than simply ignoring, which could cause you to miss important legitimate communications.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy