Which of the following is characterized by an attacker attempting to map out an organization’s seenagape 10 years ago Which of the following is characterized by an attacker attempting to map out anorganization’s staff hierarchy in order to send targeted emails? A. Whaling B. Impersonation C. Privilege escalation D. Spear phishing ← Previous question Next question →