Imagine that you gets an email one morning . It appears to be from your bank . The email warns that someone broke ( 1) .......... your account . It says that you need to (2 )....... in to check some things . You click the link in the email . It takes you to a site that looks very much like your bank's . You enter your username and (3 ).............You submit the form . You've just been phished ! Phishing is a type of attack that happens over the Internet . Users receive an email or text message that seems like it came from a (4)............. source. These users are being (5 )............ They are interacting with dangerous hackers . The attackers copy trusted companies . They send users to web pages that look like the ones we use everyday . When users login or provide sensitive information , the attackers steal this data .

1- into
with
for

2- signed
signing
sign

3- crossword
password
passroad

4- trusted
trust
trusting

5- deceiving
deceive
deceived​

Respuesta :

Answer:

1) into

2) sign

3) password

4) trusted

5) deceiving

Explanation:

The correct words that fit into the blanks are as follows:

  • Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke ( 1) into your account . It says that you need to (2 ) sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank's. You enter your username and (3 ) password. You submit the form. You've just been phished! Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a (4) trusted source. These users are being (5 ) deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

To correctly decipher which words best fit into the spaces, you need to have a good understanding of the context and the language that is relevant to it.

The above passage uses words connected with technology.

Knowledge about the ways that fraudsters operate will also be helpful in answering these questions.

Learn more here:

https://brainly.com/question/19346711