List of questions
Related questions
Question 261 - 312-50v12 discussion
Steve, an attacker, created a fake profile on a social media website and sent a request to Stell a. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?
A.
Diversion theft
B.
Baiting
C.
Honey trap
D.
Piggybacking
Your answer:
0 comments
Sorted by
Leave a comment first