What technique is used in social engineering attacks?
- man-in-the-middle
- phishing
- buffer overflow
- sending junk email
Answers Explanation & Hints:
A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information. |