This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company’s Web site, but the URLs in the e-mail actually point to a false Web site.

Posted by: Pdfprep Category: CEH-001 Tags: , ,

This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company’s Web site, but the URLs in the e-mail actually point to a false Web site.
A . Wiresharp attack
B . Switch and bait attack
C . Phishing attack
D . Man-in-the-Middle attack

Answer: C

Leave a Reply

Your email address will not be published.