Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
The telephone version of phishing that exploits social engineering techniques is known as __________.
Home
Ethical Hacking
The telephone version of phishing that exploits social engineering techniques is known as...
+1
vote
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
The telephone version of phishing that exploits social engineering techniques is known as __________.
Smishing
Vishing--
Pharming
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Jan 28, 2020
by
AdilsonLima
Vishing
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
+1
vote
Q: What are the different types of social engineering attacks?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
social-engineering-attacks
attacks-types
hacking
0
votes
Q: What is a social engineering attack?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
social-engineering
social-attacks
hacking
0
votes
Q: What is referred to as social engineering?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Which of the following can be considered as a sound example of social engineering attack?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
user-account
+1
vote
Q: The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: What is a phishing attack?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
phishing-attacks
ethical-hacking
hacking
+1
vote
Q: Phishing emails include fake notifications from banks and e-payment systems.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Distinguish between phishing and spoofing?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
#phishing
#spoofing
0
votes
Q: Difference of phishing and spoofing
asked
Oct 14, 2019
in
Ethical Hacking
by
GeorgeBell
#ethical-hacker-career
##ethical-hacker-books
#ethical-hacker-forums
#ethical-hacker-curso
#ethical-hacker-software
#ethical-hacker-certification
#ethical-hacker-question
0
votes
Q: Explain social engineering and its attacks.
asked
Sep 1, 2020
in
Cyber Security
by
Robindeniel
#social-engineering
#social-engineering-attacks
...