Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone
number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks
to call the vendor back, they are given a different phone number with a different area code. Which
of the following attack types is this?
A.
Hoax
B.
Impersonation
C.
Spear phishing
D.
Whaling