Which of the following social-engineering attacks does this describe?

An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker’s intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.

Which of the following social-engineering attacks does this describe?
A . Information elicitation
B . Typo squatting
C . Impersonation
D . Watering-hole attack

Answer: D

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments