header bg

Scan QR code or get instant email to install app

Question:

What influence principle was in use if Joe is studying a recent social engineering attack that occurred against his organization and the attacker phoned an administrative assistant and said that her files were being deleted and that he needed the assistant’s password to stop the loss of data?

A Urgency
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*