CompTIA Exam Questions

Which of the following attack methodologies is the atta…

An attacker is attempting to exploit a zero-day vulnerability in a popular enterprise application. The attacker is using personalized information to target high-value
individuals in an attempt to obtain proprietary information from the organization. Which of the following attack methodologies is the attacker using?

A.
Birthday attack

B.
Spear phishing

C.
Spoofing

D.
Man-in-the-middle