which of the following are the MOST common techniques that attackers use to socially engineer people?
Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?