• Post author:
  • Post category:SEO
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

  • social proof
  • fear
  • authority
  • scarcity
Explanation & Hints:

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments