A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

  • social proof
  • fear
  • authority
  • scarcity
Explanation & Hints:

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%