Which method of information gathering has the attacker used?
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords.
Which method of information gathering has the attacker used?
A . Trusted path
B . Malicious logic
C . Social engineering
D . Passive misuse
Answer: C
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments