Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a server for repair would be described as:

Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a
server for repair would be described as:

Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a
server for repair would be described as:

A.
a Trojan horse

B.
a man-in-the-middle attack

C.
social engineering

D.
a phishing attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *