0 of 10 questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10
Time has elapsed
0 of 0 point(s), (0)
0 of 0, (0)
Essay(s) Pending: 0 (Possible Point(s): 0)
Phishing is a method used to allow hackers to steal valuable information such as PHI.
It is the sending of email that appears to be from someone trustworthy but in reality is malicious. It will contain a link or attachment that will infect the victim’s computer with malware.
Stolen data from a phishing email would be a breach under the HIPAA Privacy Rule.
What is the best way to protect yourself from Phishing?
The email message is used to infect a computer with malware for the purposes of stealing data such as PHI
What are the ways hackers make phishing messages look real?
Phishing is one of the most widespread forms of attacks right now against internet users.
The first documented use of the word “phishing” took place in what year?
Phishing cannot be used in SMS messages, instant messages, and other similar system.
What are the other ways to use Phishing? Select TWO.