Question

When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.

Answer

This answer is hidden. It contains 13 characters.