List of questions
Related questions
Question 89 - CISSP discussion
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?
A.
Trusted path
B.
Malicious logic
C.
Social engineering
D.
Passive misuse
Your answer:
0 comments
Sorted by
Leave a comment first