An attack that involves a fraudster tricking a user into making inappropriate security decisions is known as:
A.
Spoofing
B.
Surveillance
C.
Social Engineering
D.
Man-in-the-Middle
Explanation:
otherwise would not. Social Engineering may also incorporate spoofing to trick someone in to believing the
fraudster is someone else. The following answers are incorrect: Spoofing is incorrect because it is presenting a
false context to get someone to make a bad decision and trickery alone.
Shon
Harris, CISSP All- in-One Exam Guide, 3rd Edition, pg. 762.