Which of the following attacks occurs when an outsider calls the help desk pretending to be the
Chief Executive Officer (CEO) who cannot remember their login credentials?
A.
Whaling
B.
Phishing
C.
Social engineering
D.
Malware
Which of the following attacks occurs when an outsider calls the help desk pretending to be the
Chief Executive Officer (CEO) who cannot remember their login credentials?
Which of the following attacks occurs when an outsider calls the help desk pretending to be the
Chief Executive Officer (CEO) who cannot remember their login credentials?
A.
Whaling
B.
Phishing
C.
Social engineering
D.
Malware