Which of the following attack methodologies is the atta…

An attacker is attempting to exploit a zero-day vulnerability in a popular enterprise application. The attacker is using personalized information to target high-value
individuals in an attempt to obtain proprietary information from the organization. Which of the following attack methodologies is the attacker using?

An attacker is attempting to exploit a zero-day vulnerability in a popular enterprise application. The attacker is using personalized information to target high-value
individuals in an attempt to obtain proprietary information from the organization. Which of the following attack methodologies is the attacker using?

A.
Birthday attack

B.
Spear phishing

C.
Spoofing

D.
Man-in-the-middle



Leave a Reply 0

Your email address will not be published. Required fields are marked *

20 − 16 =