An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?
A. Smishing
B. Phishing
C. Impersonating
D. Vishing
A. Smishing
B. Phishing
C. Impersonating
D. Vishing