Company engineers regularly participate in a public Internet forum with other engineers throughout the industry.
Which of the following tactics would an attacker MOST likely use in this scenario?
A . Watering-hole attack
B . Credential harvesting
C . Hybrid warfare
D . Pharming
Answer: A