Which type of social engineering attack attempts to discover personal information through the use of email?

A. email surfing
B. footprinting
C. spamming
D. phishing

Answer: D

Computer Science & Information Technology

You might also like to view...

In what resource do many different resources come together to form the definition of an Android application screen?

a. Layout XML resource b. Menu resource c. Application resource d. Dimension resource

Computer Science & Information Technology

It is a convenience to be able to use one reasonable name for ____ that are functionally identical except for argument types.

A. arguments B. classes C. tasks D. packages

Computer Science & Information Technology