{"id":764,"date":"2021-07-17T19:08:14","date_gmt":"2021-07-17T19:08:14","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=764"},"modified":"2021-09-11T07:11:21","modified_gmt":"2021-09-11T07:11:21","slug":"how-to-detect-phishing","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/","title":{"rendered":"How to detect phishing ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"how-to-detect-phishing\" class=\"color-pink\" style=\"text-align: justify;\">How to detect phishing ?<\/h2>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\">There are 5 ways to detect a phishing.They are<\/p>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><b>The email is sent from a public email address<\/b>\u00a0\u2013 The sender\u2019s\u00a0<a href=\"https:\/\/www.wikitechy.com\/tutorials\/linux\/how-to-send-a-file-as-an-email-attachment-using-linux-command-line\" target=\"_blank\" rel=\"noopener\">email<\/a>\u00a0address, as this can help identify if the person is truly who they claim to be. Frequently, the criminal will use a public\u00a0<a href=\"https:\/\/www.wikitechy.com\/tutorials\/javascript\/valid-email-address-in-javascript\" target=\"_blank\" rel=\"noopener\">email address<\/a>\u00a0such as gmail.com. If your bank or team mate is going to email you, it will come from a company email account with the company name in the\u00a0<a href=\"https:\/\/www.wikitechy.com\/angularjs\/directives\/angularjs-input-email\" target=\"_blank\" rel=\"noopener\">email<\/a>\u00a0address.<\/li>\n<li><b>Strange attachments<\/b>\u00a0\u2013 If you receive an unexpected\u00a0<a href=\"https:\/\/forums.wikitechy.com\/question\/using-the-facebook-graph-api-how-to-get-users-email\/\" target=\"_blank\" rel=\"noopener\">email<\/a>\u00a0or an email from someone you don\u2019t know asking you to open an attachment, do not open it. These attachments can contain malware that can damage your computer and capture your personal data.<\/li>\n<li><b>The creation of a sense of urgency<\/b>\u00a0\u2013 Phishing\u00a0<a href=\"https:\/\/www.wikitechy.com\/php\/php-email-verification-script-for-downloading-e-book\" target=\"_blank\" rel=\"noopener\">emails<\/a>\u00a0often ask recipients to verify personal information, such as bank details or a password. They can create a sense of urgency by warning that your account has experienced doubtful activity or imagining to be someone you know who is in urgent need of financial help.These are massive warning signs. If you are ever unsure, contact the company or person using the contact details you already have for them or that are on their genuine website. Never use any contact details or click any links provided in the email.How to detect phishing ? \u2013 The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly who they claim to be. Often, the criminal will use a public email address such as gmail.com.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li><b>Links to unrecognised sites or URLs that misspell a familiar domain name<\/b>\u00a0\u2013 Phishing emails may ask you to click a link within the email. By hovering your mouse over the link or address, you can see the linked site\u2019s true URL. These URLs can be slightly misspelled or completely different to what you are expecting, so always double check before you click.<\/li>\n<li><b>Poor spelling and grammar<\/b>\u00a0\u2013 You can often detect a phishing email by the way it is written. The writing style might be different to that usually used by the sender and it might contain spelling mistakes and poor grammar.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\">One of the reasons behind the large increase in phishing attacks is the lack of basic knowledge about them. People are fundamental to cyber security, so it is vital that they can detect security threats and know how to respond.A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks. This includes an online staff questionnaire, whose results will be analysed to gauge their cyber security awareness.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Answer : There are 5 ways to detect a phishing&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4590],"tags":[4812,195,201,4609,360,221,203,199,363,15908,4606,205,222,362,4821,4814,4809,4802,4815,4824,4817,4818,4823,4811,4816,4820,196,4813,212,213,710,207,4605,366,204,217,4792,4795,4803,4801,4794,4822,4810,4798,4800,4819,4793,4806,4799,288,367,483,206,4808,4807,4796,4804,4825,4608,200,197,4607,4805,4797],"class_list":["post-764","post","type-post","status-publish","format-standard","hentry","category-networking","tag-7-ways-to-spot-phishing-email","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-applied-mate-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-bharti-airtel-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-ciena-corporation-interview-questions-and-answers","tag-comodo-india-interview-questions-and-answers","tag-css-corp-pvt-ltd-interview-questions-and-answers","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-flipkart-interview-questions-and-answers","tag-hcl-technologies-interview-questions-and-answers","tag-how-can-you-identify-a-phishing-email","tag-how-to-detect-phishing-attacks","tag-how-to-identify-a-spam-email","tag-how-to-prevent-phishing","tag-how-to-prevent-phishing-and-spoofing","tag-how-to-prevent-spam-mail","tag-how-to-prevent-spear-phishing","tag-how-to-protect-against-phishing","tag-how-to-recognize-spam-email","tag-how-to-stop-phishing-emails","tag-how-to-stop-phishing-emails-in-gmail","tag-how-to-stop-phishing-emails-outlook","tag-ibm-interview-questions-and-answers","tag-identify-a-phishing-attack","tag-indecomm-global-services-interview-questions-and-answers","tag-infosys-technologies-interview-questions-and-answers","tag-mavenir-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-ncr-corporation-interview-questions-and-answers","tag-netapp-interview-questions-and-answers","tag-oracle-corporation-interview-questions-and-answers","tag-peoplestrong-interview-questions-and-answers","tag-phishing","tag-phishing-attack","tag-phishing-attempt","tag-phishing-definition","tag-phishing-email","tag-phishing-email-checker","tag-phishing-email-examples","tag-phishing-mail","tag-phishing-meaning","tag-phishing-prevention-best-practices","tag-phishing-scams","tag-phishing-warning-sign","tag-pishing","tag-r-systems-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-reliance-industries-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-show-to-prevent-phishing","tag-show-to-protect-yourself-against-phishing-threat","tag-spear-phishing","tag-spear-phishing-examples","tag-spotting-spam-emails","tag-tata-communications-interview-questions-and-answers","tag-tech-mahindra-interview-questions-and-answers","tag-unitedhealth-group-interview-questions-and-answers","tag-virtela-interview-questions-and-answers","tag-what-does-phishing-mean","tag-what-is-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to detect phishing ? - Networking Interview Questions - Wikitechy<\/title>\n<meta name=\"description\" content=\"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to detect phishing ? - Networking Interview Questions - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T19:08:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-11T07:11:21+00:00\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"headline\":\"How to detect phishing ?\",\"datePublished\":\"2021-07-17T19:08:14+00:00\",\"dateModified\":\"2021-09-11T07:11:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/\"},\"wordCount\":459,\"commentCount\":0,\"keywords\":[\"7 ways to spot phishing email\",\"Accenture interview questions and answers\",\"Allstate Solutions Pvt Ltd interview questions and answers\",\"Applied Mate interview questions and answers\",\"Atos interview questions and answers\",\"Bharti Airtel interview questions and answers\",\"Capgemini interview questions and answers\",\"CASTING NETWORKS INDIA PVT LIMITED interview questions and answers\",\"Ciena Corporation interview questions and answers\",\"Comodo India Interview Questions and Answers\",\"CSS Corp Pvt Ltd interview questions and answers\",\"Dell International Services India Pvt Ltd interview questions and answers\",\"Flipkart interview questions and answers\",\"HCL Technologies interview questions and answers\",\"how can you identify a phishing email\",\"how to detect phishing attacks\",\"how to identify a spam email\",\"how to prevent phishing\",\"how to prevent phishing and spoofing\",\"how to prevent spam mail\",\"how to prevent spear phishing\",\"how to protect against phishing\",\"how to recognize spam email\",\"how to stop phishing emails\",\"how to stop phishing emails in gmail\",\"how to stop phishing emails outlook\",\"IBM interview questions and answers\",\"identify a phishing attack\",\"Indecomm Global Services interview questions and answers\",\"Infosys Technologies interview questions and answers\",\"Mavenir interview questions and answers\",\"Mphasis interview questions and answers\",\"NCR Corporation interview questions and answers\",\"NetApp interview questions and answers\",\"Oracle Corporation interview questions and answers\",\"PeopleStrong interview questions and answers\",\"phishing\",\"phishing attack\",\"phishing attempt\",\"phishing definition\",\"phishing email\",\"phishing email checker\",\"phishing email examples\",\"phishing mail\",\"phishing meaning\",\"phishing prevention best practices\",\"phishing scams\",\"phishing warning sign\",\"pishing\",\"R Systems interview questions and answers\",\"RBS India Development Centre Pvt Ltd interview questions and answers\",\"Reliance Industries Ltd interview questions and answers\",\"SAP Labs India Pvt Ltd interview questions and answers\",\"show to prevent phishing\",\"show to protect yourself against phishing threat\",\"spear phishing\",\"spear phishing examples\",\"spotting spam emails\",\"Tata Communications interview questions and answers\",\"Tech Mahindra interview questions and answers\",\"UnitedHealth Group interview questions and answers\",\"Virtela interview questions and answers\",\"what does phishing mean\",\"what is phishing\"],\"articleSection\":[\"Networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/\",\"name\":\"How to detect phishing ? - Networking Interview Questions - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\"},\"datePublished\":\"2021-07-17T19:08:14+00:00\",\"dateModified\":\"2021-09-11T07:11:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/networking\\\/how-to-detect-phishing\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/author\\\/editor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to detect phishing ? - Networking Interview Questions - Wikitechy","description":"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/","og_locale":"en_US","og_type":"article","og_title":"How to detect phishing ? - Networking Interview Questions - Wikitechy","og_description":"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/","og_site_name":"Wikitechy","article_published_time":"2021-07-17T19:08:14+00:00","article_modified_time":"2021-09-11T07:11:21+00:00","author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/#article","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/"},"author":{"name":"Editor","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"headline":"How to detect phishing ?","datePublished":"2021-07-17T19:08:14+00:00","dateModified":"2021-09-11T07:11:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/"},"wordCount":459,"commentCount":0,"keywords":["7 ways to spot phishing email","Accenture interview questions and answers","Allstate Solutions Pvt Ltd interview questions and answers","Applied Mate interview questions and answers","Atos interview questions and answers","Bharti Airtel interview questions and answers","Capgemini interview questions and answers","CASTING NETWORKS INDIA PVT LIMITED interview questions and answers","Ciena Corporation interview questions and answers","Comodo India Interview Questions and Answers","CSS Corp Pvt Ltd interview questions and answers","Dell International Services India Pvt Ltd interview questions and answers","Flipkart interview questions and answers","HCL Technologies interview questions and answers","how can you identify a phishing email","how to detect phishing attacks","how to identify a spam email","how to prevent phishing","how to prevent phishing and spoofing","how to prevent spam mail","how to prevent spear phishing","how to protect against phishing","how to recognize spam email","how to stop phishing emails","how to stop phishing emails in gmail","how to stop phishing emails outlook","IBM interview questions and answers","identify a phishing attack","Indecomm Global Services interview questions and answers","Infosys Technologies interview questions and answers","Mavenir interview questions and answers","Mphasis interview questions and answers","NCR Corporation interview questions and answers","NetApp interview questions and answers","Oracle Corporation interview questions and answers","PeopleStrong interview questions and answers","phishing","phishing attack","phishing attempt","phishing definition","phishing email","phishing email checker","phishing email examples","phishing mail","phishing meaning","phishing prevention best practices","phishing scams","phishing warning sign","pishing","R Systems interview questions and answers","RBS India Development Centre Pvt Ltd interview questions and answers","Reliance Industries Ltd interview questions and answers","SAP Labs India Pvt Ltd interview questions and answers","show to prevent phishing","show to protect yourself against phishing threat","spear phishing","spear phishing examples","spotting spam emails","Tata Communications interview questions and answers","Tech Mahindra interview questions and answers","UnitedHealth Group interview questions and answers","Virtela interview questions and answers","what does phishing mean","what is phishing"],"articleSection":["Networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/","name":"How to detect phishing ? - Networking Interview Questions - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"datePublished":"2021-07-17T19:08:14+00:00","dateModified":"2021-09-11T07:11:21+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"How to detect phishing ? - The email is sent from a public email address.Look at the sender\u2019s email address, as this can help identify if the person is truly","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/how-to-detect-phishing\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=764"}],"version-history":[{"count":2,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/764\/revisions"}],"predecessor-version":[{"id":3328,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/764\/revisions\/3328"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}