A malicious actor compromises a legitimate website, configuring it to deliver malware to visitors of the website.
Which of the following attacks does this describe?
A . Whaling
B . Watering hole
C . Impersonation
D . Spoofing
Answer: B
A malicious actor compromises a legitimate website, configuring it to deliver malware to visitors of the website.
Which of the following attacks does this describe?
A . Whaling
B . Watering hole
C . Impersonation
D . Spoofing
Answer: B