An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the
recipient to a malicious site where information is harvested. The message is narrowly tailored so it
is effective on only a small number of victims. This describes which of the following?

A.
Spear phishing
B.
Phishing
C.
Smurf attack
D.
Vishing
Explanation: