An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email in hopes the Chief Executive Officer (CEO) logs in to obtain the CEO's login credentials. Which of the following types of attacks is this an example of?
Dave1212
Highly Voted 4 years, 2 months agomdmdmd
4 years, 1 month agophorpiex
Highly Voted 4 years agomiabe
Most Recent 3 years agobaybay
3 years, 4 months agoCock
3 years, 4 months ago[Removed]
3 years, 10 months agoCapCrunch
4 years agoversun
4 years agoDrChats
4 years agononyabiz
4 years agoboooliyooo
4 years agorohog
4 years, 1 month agox0hmei
4 years, 1 month agocatastrophie
4 years, 1 month ago