5:00
Stop
CompTIA Security+ - Threat Analysis and Vulnerability Scanning - Social Engineering
Beginner
1/5
A user receives a text message from an individual claiming to be the CEO demanding sensitive information. The user cannot verify the text messages' authenticity. What should the user do?
Beginner