When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A. spear phishing
B. email surfing
C. personal
D. email phishing


Answer: A

Computer Science & Information Technology

You might also like to view...

Many font options are located in the Font Dialog Box Launcher in the __________.

A. FONT tab B. Font group C. Font ribbon D. Font box

Computer Science & Information Technology

Presenting only ________ information can help you put your best foot forward

Fill in the blank(s) with correct word

Computer Science & Information Technology

By default, Word sets right-aligned tab stops every 1/2 inch. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The six large placeholders on the ____ Master represent where the slides will appear.

A. Handout B. Slide C. Notes D. Photo Album

Computer Science & Information Technology