Which of the following threats uses personalized information in an attempt at obtaining information?
A . Whaling
B . Impersonation
C . Spoofing
D . Spear phishing
Answer: D
Which of the following threats uses personalized information in an attempt at obtaining information?
A . Whaling
B . Impersonation
C . Spoofing
D . Spear phishing
Answer: D