A user from the accounting department received a call asking for hardware and software information. To which
of the following is this user being exposed?
A. Eavesdropping
B. Impersonation
C. Phishing
D. Whaling
of the following is this user being exposed?
A. Eavesdropping
B. Impersonation
C. Phishing
D. Whaling