List of questions
Related questions
Question 268 - 312-50v12 discussion
Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee.
Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?
A.
Social engineering
B.
insider threat
C.
Password reuse
D.
Reverse engineering
Your answer:
0 comments
Sorted by
Leave a comment first