Which method of information gathering has the attacker used?

While impersonating an Information Security Officer (ISO), an attacker obtains information from
company employees about their User IDs and passwords. Which method of information gathering
has the attacker used?

While impersonating an Information Security Officer (ISO), an attacker obtains information from
company employees about their User IDs and passwords. Which method of information gathering
has the attacker used?

A.
Trusted path

B.
Malicious logic

C.
Social engineering

D.
Passive misuse



Leave a Reply 0

Your email address will not be published. Required fields are marked *