Which of the following types of attacks is this an example of?

An attacker uses SET to make a copy of a company’s cloud-hosted web mail portal and sends an email m to obtain the CEO s login credentials.

Which of the following types of attacks is this an example of?
A . Elicitation attack
B . Impersonation attack
C . Spear phishing attack
D . Drive-by download attack

Answer: A

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments