This attack uses social engineering techniques to trick users into accessing a fake Web site and
divulging personal information. Attackers send a legitimate-looking e-mail asking users to update
their information on the company’s Web site, but the URLs in the e-mail actually point to a false
Web site.
A.
Wiresharp attack
B.
Switch and bait attack
C.
Phishing attack
D.
Man-in-the-Middle attack
C.Phishing attack
C is the Ans.