Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6).
Submit