Which common tactic used by social engineers involves impersonating a trusted person or organization to gain sensitive information?
Pretexting
Malware
Spear phishing
Baiting

Cybersecurity Management Übungen werden geladen ...