Which of the following BEST describes this type of attack?

A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank’s privacy policy, security policy and requests that the user clearly state their name, birthday and enter the banking details to validate the user’s identity. Which of the following BEST describes this type of attack?

A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank’s privacy policy, security policy and requests that the user clearly state their name, birthday and enter the banking details to validate the user’s identity. Which of the following BEST describes this type of attack?

A.
Phishing

B.
Spoofing

C.
Vishing

D.
Pharming



Leave a Reply 0

Your email address will not be published. Required fields are marked *