In social engineering attacks, which technique is often used to obtain sensitive information?
Brute-force attacks
Network vulnerability scanning
Malware downloads
Phishing emails

Data Security Exercises are loading ...