Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
Fill in the blank: _____ uses text messages to manipulate targets into sharing sensitive information.
- Pretexting
- Vishing
- Smishing
- Whaling
Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
Fill in the blank: _____ uses text messages to manipulate targets into sharing sensitive information.