Multiple Choice
A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system. Which of the following techniques have the hackers used?
A) pretexting
B) IP spoofing
C) spear phishing
D) phone phishing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Attack vectors refer to the ways hackers
Q3: List some of the regulatory laws that
Q4: Adam owns and manages a large insurance
Q5: Data breach notifications should state that the
Q6: According to the reports in Ponemon's 2014
Q7: Organizations can implement countermeasures that make data
Q8: Explain how data breach occurs with an
Q9: The _ is a regulatory law that
Q10: Talgedco Inc., a software company, has taken
Q11: Bob, a hacker, encountered a vulnerability in