What technique is used in social engineering attacks?
- buffer overflow
- sending junk email
Answers Explanation & Hints:
A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.