Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a
server for repair would be described as:
A.
a Trojan horse
B.
a man-in-the-middle attack
C.
social engineering
D.
a phishing attack
Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a
server for repair would be described as:
Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a
server for repair would be described as:
A.
a Trojan horse
B.
a man-in-the-middle attack
C.
social engineering
D.
a phishing attack