An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email in hopes the Chief Executive Officer (CEO) logs in to obtain the CEO's login credentials.
A) Elicitation attack
B) Impersonation attack
C) Spear phishing attack
D) Drive-by download attack
Correct Answer:
Verified
Q145: Which of the following tools is used
Q146: When performing compliance-based assessments, which of the
Q147: Click the exhibit button. Q148: A penetration tester has compromised a host. Q149: Joe, an attacker, intends to transfer funds Q151: A penetration tester is reviewing the following Q152: A penetration tester is performing a code Q153: A security analyst has uncovered a suspicious Q154: A company performed an annual penetration test Q155: A client has voiced concern about the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents