Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?

Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
A . Whaling
B . Impersonation
C . Privilege escalation
D . Spear phishing

Answer: A

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments