Last Updated on March 17, 2021 by Admin
What technique is used in social engineering attacks?
- buffer overflow
- sending junk email
Answers Explanation & Hints:
A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.