PrepAway - Latest Free Exam Questions & Answers

Which of the following attack methodologies is the atta…

An attacker is attempting to exploit a zero-day vulnerability in a popular enterprise application. The attacker is using personalized information to target high-value
individuals in an attempt to obtain proprietary information from the organization. Which of the following attack methodologies is the attacker using?

PrepAway - Latest Free Exam Questions & Answers

A.
Birthday attack

B.
Spear phishing

C.
Spoofing

D.
Man-in-the-middle


Leave a Reply