which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor…?

In which of the following Person-to-Person social engineering attacks does an attacker pretend to
be an outside contractor, delivery person, etc., in order to gain physical access to the
organization?

In which of the following Person-to-Person social engineering attacks does an attacker pretend to
be an outside contractor, delivery person, etc., in order to gain physical access to the
organization?

A.
In person attack

B.
Third-party authorization attack

C.
Impersonation attack

D.
Important user posing attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *