Cryptography MC
Cryptography
Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?
Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?
Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?
A. Hoaxes
B. Phishing
C. Dumpster diving
D. Shoulder surfing
Answer: B
Learn More :