Which type of social engineering attack attempts to discover personal information through the use of email?
A. email surfing
B. footprinting
C. spamming
D. phishing
Answer: D
Computer Science & Information Technology
You might also like to view...
In what resource do many different resources come together to form the definition of an Android application screen?
a. Layout XML resource b. Menu resource c. Application resource d. Dimension resource
Computer Science & Information Technology
It is a convenience to be able to use one reasonable name for ____ that are functionally identical except for argument types.
A. arguments B. classes C. tasks D. packages
Computer Science & Information Technology