Phishing emails frequently take advantage of high-profile catastrophes reported in the news.Which of the following principles BEST describes the weakness being exploited?

A. Intimidation
B. Scarcity
C. Authority
D. Social proof

Answer: D. Social proof

Computer Science & Information Technology

You might also like to view...

Customizable mini-programs that display continuously updated information in the Windows Sidebar are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Reports can be created based on the results of a parameter query

Indicate whether the statement is true or false

Computer Science & Information Technology