What technique is used in social engineering attacks?

IT Questions BankCategory: CCNA CyberOpsWhat technique is used in social engineering attacks?

What technique is used in social engineering attacks?

  • sending junk email
  • buffer overflow
  • phishing
  • man-in-the-middle

Explanation: A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.

Exam with this question: CyberOps Associate Course Final Exam Answers
Exam with this question: Networking Essentials ( Version 2) – Networking Essentials 2.0 Final Exam SD

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments