Which of the following types of attacks is this an example of?
An attacker uses SET to make a copy of a company’s cloud-hosted web mail portal and sends an email m to obtain the CEO s login credentials.
Which of the following types of attacks is this an example of?
A . Elicitation attack
B . Impersonation attack
C . Spear phishing attack
D . Drive-by download attack
Answer: A
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments