Attackers send a legitimate-looking e-mail asking users to update their information on the company’s Web site, but the URLs in the e-mail actually point to a false Web site.

This attack uses social engineering techniques to trick users into accessing a fake Web site and
divulging personal information. Attackers send a legitimate-looking e-mail asking users to update
their information on the company’s Web site, but the URLs in the e-mail actually point to a false
Web site.

This attack uses social engineering techniques to trick users into accessing a fake Web site and
divulging personal information. Attackers send a legitimate-looking e-mail asking users to update
their information on the company’s Web site, but the URLs in the e-mail actually point to a false
Web site.

A.
Wiresharp attack

B.
Switch and bait attack

C.
Phishing attack

D.
Man-in-the-Middle attack



Leave a Reply 2

Your email address will not be published. Required fields are marked *


omkarershwar

omkarershwar

C.Phishing attack

Ghost Man

Ghost Man

C is the Ans.