Which of the following is characterized by an attacker attempting to map out an organization’s sta seenagape 10 years ago Which of the following is characterized by an attacker attempting to map out an organization’s staffhierarchy in order to send targeted emails? A.Whaling B.Impersonation C.Privilege escalation D.Spear phishing ← Previous question Next question →