Which of the following threats uses personalized information in an attempt at obtaining information?

Which of the following threats uses personalized information in an attempt at obtaining information?
A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing

CompTIA A+ 220-1102 (Core 1) Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

One thought on “Which of the following threats uses personalized information in an attempt at obtaining information?

  1. D Spear fishing
    Took and passed the Core2 exam today. Only about 25% of all these sample test questions were on my exam. Had 77 questions for 90 minutes (about 1:20 per question). Had to go slow because I had to think hard about each of the 55 or so questions I’d never seen before. Exam ended and I had 4 questions unanswered. Be sure not to pause too long to ponder correct answers. But these questions provided an excellent base of knowledge for the exam.

    2
    1

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.