An attacker browses a company's online job board attempting to find any relevant information regarding the
technologies the company uses. Which of the following BEST describes this social engineering technique?
A. Hoax
B. Reconnaissance
C. Impersonation
D. Pretexting
technologies the company uses. Which of the following BEST describes this social engineering technique?
A. Hoax
B. Reconnaissance
C. Impersonation
D. Pretexting