which statement applies to phishing attacks ?