What technique is used in social engineering attacks?

  • man-in-the-middle
  • phishing
  • buffer overflow
  • sending junk email
Answers Explanation & Hints:

A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.

For more Questions and Answers:

Networking Essentials 2.0 Final Exam Answers Full 100%

CyberOps Associate 1.0 & CA 1.02 Final Exam Answers Full 100%