What technique is used in social engineering attacks?
- sending junk email
- buffer overflow
- phishing
- man-in-the-middle
Explanation: A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.
Exam with this question: CyberOps Associate Course Final Exam Answers
Exam with this question: Networking Essentials ( Version 2) – Networking Essentials 2.0 Final Exam SD
Please login or Register to submit your answer