Which of the following is a type of attack where an attacker pretends to be a trustworthy entity to steal sensitive information?
Which of the following is a type of attack where an attacker pretends to be a trustworthy entity to steal sensitive information?