Statements A, B and D are standard recommendations for email security, while C encourages risky behaviour and is wrong. Phishing attempts often mimic banks, universities or service providers to harvest credentials. Users should inspect URLs and report suspicious messages so that filters can be updated and warnings issued. Urgency cues are commonly abused in scams and do not guarantee safety of attachments.
Option A:
Option A is incomplete because it lists only A and B and omits D. While recognising phishing patterns and checking links is important, reporting incidents also strengthens organisational defences.
Option B:
Option B is incorrect because it includes A, B and C and thus accepts C. Since attackers deliberately send urgent messages with harmful attachments, this advice would expose users to unnecessary danger.
Option C:
Option C is correct because it combines awareness of phishing, verification of links and the organisational step of reporting suspicious emails. By excluding C, it rejects the unsafe idea that urgency alone can justify opening unknown attachments.
Option D:
Option D is incomplete because it groups B and D only and leaves out A. Statement A provides the basic description of phishing, without which the rationale for the other actions becomes less clear.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!