Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?

Which of the following is characterized by an attacker attempting to map out an
organization’s staff hierarchy in order to send targeted emails?

Which of the following is characterized by an attacker attempting to map out an
organization’s staff hierarchy in order to send targeted emails?

A.
Whaling

B.
Impersonation

C.
Privilege escalation

D.
Spear phishing



Leave a Reply 3

Your email address will not be published. Required fields are marked *

seventeen − fifteen =


Riva Cezar

Riva Cezar

I’ll right away grab your rss feed as I can not find your email subscription link or e-newsletter service. Do you have any? Kindly let me know in order that I could subscribe. Thanks.

http://www.bastcilkdoptb.com/

Bob

Bob

Shouldn’t this be spear phishing? Sending targeted emails is spear phishing, sending targeted emails to a ceo or someone like that is whaling. The question says nothing about targeting the big guys.

vladimir

vladimir

I think the key word is “to map out an
organization’s staff hierarchy”. That is why