When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A. spear phishing
B. email surfing
C. personal
D. email phishing

Answer: A

Computer Science & Information Technology

You might also like to view...

Routine reports can be scheduled hourly, daily, weekly, monthly, or yearly

a. true b. false

Computer Science & Information Technology

Multiple users report that the network color printer is not printing in color, but only in monochrome. The technician knows the print server had maintenance done over the weekend that included driver updates. The NEXT action would be to:

A. flash the firmware on the printer to match the new driver B. check the printer properties on the server C. power cycle the printer to update the driver D. have each user remove and re-install the printer to update the driver

Computer Science & Information Technology