Phishing emails frequently take advantage of high-profile catastrophes reported in the news.Which of the following principles BEST describes the weakness being exploited?
A. Intimidation
B. Scarcity
C. Authority
D. Social proof
Answer: D. Social proof
Computer Science & Information Technology
You might also like to view...
Customizable mini-programs that display continuously updated information in the Windows Sidebar are called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Reports can be created based on the results of a parameter query
Indicate whether the statement is true or false
Computer Science & Information Technology