Jane, an individual, has recently been calling various financial offices pretending to be
another person to gain financial information. Which of the following attacks is being
described?
A.
Phishing
B.
Tailgating
C.
Pharming
D.
Vishing
Jane, an individual, has recently been calling various financial offices pretending to be
another person to gain financial information. Which of the following attacks is being
described?
Jane, an individual, has recently been calling various financial offices pretending to be
another person to gain financial information. Which of the following attacks is being
described?
A.
Phishing
B.
Tailgating
C.
Pharming
D.
Vishing