An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
A.
Social engineering
B.
Bluesnarfing
C.
Man-in-the-middle
D.
Evil Twin
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
A.
Social engineering
B.
Bluesnarfing
C.
Man-in-the-middle
D.
Evil Twin