Which of the following threats uses personalized information in an attempt at obtaining information?

Posted by: Pdfprep Category: 220-1002 Tags: , ,

Which of the following threats uses personalized information in an attempt at obtaining information?
A . Whaling
B . Impersonation
C . Spoofing
D . Spear phishing

Answer: D

Leave a Reply

Your email address will not be published.