Which situation exemplifies a phishing attack?

Study for the AP Computer Science Principles Exam. Use flashcards and multiple choice questions, each question includes hints and detailed explanations. Get ready for the exam!

The situation that exemplifies a phishing attack involves receiving an email from the IT support desk that requests sensitive information, such as your username and password, in order to verify your account. This is characteristic of phishing because it employs social engineering tactics to deceive individuals into disclosing confidential information under the guise of a legitimate request.

Phishing attacks often involve impersonation, where the attacker masquerades as a trustworthy entity to gain the victim's trust. In this case, the email appears to originate from a credible source (IT support) and solicits sensitive information that could be used for malicious purposes if it falls into the wrong hands. It exploits the victim's potential lack of suspicion towards seemingly official communications, making it a classic example of phishing.

While the other scenarios describe various forms of cybersecurity threats—such as malware spreading across networks, spam emails for low-quality products, or software designed to monitor and steal personal information—they do not specifically involve the act of tricking a user into providing sensitive data through deceptive communications. Phishing is focused on that deceptive solicitation aspect, making the selected situation the most representative of a phishing attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy