Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
A . Whaling
B . Impersonation
C . Privilege escalation
D . Spear phishing
Answer: A
Latest N10-007 Dumps Valid Version with 601 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund