Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 12 Topic 2 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 12 Topic 2 Discussion

212-89 Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

David, an incident responder, investigates an email-based breach where the CFO's email account was compromised and used to send invoice modification requests to vendors. Logs reveal the attacker accessed the account using valid credentials after the CFO clicked on a fake Microsoft 365 login prompt sent via email. Which technique did the attacker most likely use?


A.

Mail bombing


B.

Pharming


C.

Spimming


D.

Spear phishing


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.