Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
2 Comments on “Which of the following is characterized by an attacker attempting to map out an organization’s staff hie”
Bobsays:
Shouldn’t this be spear phishing? Sending targeted emails is spear phishing, sending targeted emails to a ceo or someone like that is whaling. The question says nothing about targeting the big guys.
0
0
vladimirsays:
I think the key word is “to map out an
organization’s staff hierarchy”. That is why
Shouldn’t this be spear phishing? Sending targeted emails is spear phishing, sending targeted emails to a ceo or someone like that is whaling. The question says nothing about targeting the big guys.
0
0
I think the key word is “to map out an
organization’s staff hierarchy”. That is why
0
0