Which of the following is characterized by an attacker attempting to map out an organizations staff hierarchy in order to send targeted emails?

Which of the following is characterized by an attacker attempting to map out an organizations staff hierarchy in order to send targeted emails?

Which of the following is characterized by an attacker attempting to map out an organizations staff hierarchy in order to send targeted emails?

A.
Whaling

B.
Impersonation

C.
Privilege escalation

D.
Spear phishing



Leave a Reply 0

Your email address will not be published. Required fields are marked *