In which of the following attacks does an attacker pretend to be a legitimate or authorized person and uses a phone or other communication medium to mislead targets and trick them into revealing information?

A. Dumpster Diving
B. Eavesdropping
C. Impersonation
D. Shoulder Surfing

Answer: C. Impersonation

Computer Science & Information Technology

You might also like to view...

A(n) ________ server is used to host an Internet site

Fill in the blank(s) with correct word

Computer Science & Information Technology

Marking a presentation as final prevents others from changing the presentation.

a. true b. false

Computer Science & Information Technology