What technique is used in social engineering attacks?

What technique is used in social engineering attacks?

  • man-in-the-middle
  • phishing
  • buffer overflow
  • sending junk email
    Answers Explanation & Hints:

    A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.

Leave a comment