Multiple Choice
Which of the following threats uses personalized information in an attempt at obtaining information?
A) Whaling
B) Impersonation
C) Spoofing
D) Spear phishing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q77: A company has hired a new IT
Q78: Which of the following is a reason
Q79: A project team is organized to implement
Q80: A technician is in the process of
Q81: Following an incident, an administrator is gathering
Q83: A technician is in the process of
Q84: A technician is called to troubleshoot a
Q85: Joe, a mobile device user, reached his
Q86: A technician needs to ensure users are
Q87: A customer brings an old PC to