A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website.
Which of the following threats was used to carry out the attack?
A. Zero day
B. Vishing
C. DDoS
D. Evil twin
Which of the following threats was used to carry out the attack?
A. Zero day
B. Vishing
C. DDoS
D. Evil twin