A user receives an automated call which appears to be from their bank. The automated recording
provides details about the bank’s privacy policy, security policy and requests that the user clearly
state their name, birthday and enter the banking details to validate the user’s identity. Which of the
following BEST describes this type of attack?
A.
Phishing
B.
Spoofing
C.
Vishing
D.
Pharming
Explanation: