Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?
A. Phone call
B. Instant message
C. Email
D. Text message
A. Phone call
B. Instant message
C. Email
D. Text message