Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?
A . A spear-phishing email with a file attachment
B . A DoS using loT devices
C . An evil twin wireless access point
D . A domain hijacking of a bank website
Answer: A