ISC CISSP Question Answer
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?
ISC CISSP Summary
- Vendor: ISC
- Product: CISSP
- Update on: Jul 25, 2025
- Questions: 1486