Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?
A.
Phishing
B.
Tailgating
C.
Pharming
D.
Vishing
Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?
Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?
A.
Phishing
B.
Tailgating
C.
Pharming
D.
Vishing