When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?
A. spear phishing
B. email surfing
C. personal
D. email phishing
Answer: A
Computer Science & Information Technology
You might also like to view...
Many font options are located in the Font Dialog Box Launcher in the __________.
A. FONT tab B. Font group C. Font ribbon D. Font box
Computer Science & Information Technology
Presenting only ________ information can help you put your best foot forward
Fill in the blank(s) with correct word
Computer Science & Information Technology
By default, Word sets right-aligned tab stops every 1/2 inch. ____________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The six large placeholders on the ____ Master represent where the slides will appear.
A. Handout B. Slide C. Notes D. Photo Album
Computer Science & Information Technology