While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords.
Which method of information gathering has the attacker used?
A . Trusted path
B . Malicious logic
C . Social engineering
D . Passive misuse
Answer: C
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund