Question

_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.
a. Dumpster diving
b. Cyberterrorism
c. Social engineering attack
d. Organizational identity theft

Answer

This answer is hidden. It contains 1 characters.