Social Engineering

Edit Answers
ONAIXYUWWKCKDZXJJHVL INMAILYNCREDENTIALSD VMJSBBEONNTPPCGTIRWL TNFXSWZIVISHINGZXKLD JUQILETTATUVVBSNIION HDRMAAHAAERYIGNIMKAT SJCACANNXETBBLVALVEA WBOLKYIONPYDPOGSZMHK NLDIQKDSPQDCAYKMYWHI SGECCDERHJDIOTTIZOOM GIYIRJKEIOTLECWSDQFZ NSLOEKNPSEDMDKSHLFKB IRSUQCIMHDPKFBUICRYN TEMSUYLIIIHSPVDNMITD EKHJEKFNNVOMVEVGCIJF ECJMSQBMGVNAEFZOVTWD MAPKTFOIZOEEWYZTTEOL CTLWSYXFDIPTBBPWQXAN QTPBPFXQQCCVDDFKCTKI VAFGJOAFJEHTOYSXSFHT
1.
SMISHING
2.
VISHING
3.
ZOOM
4.
SLACK
5.
TEAMS
6.
LINKEDIN
7.
INMAIL
8.
QRCODE
9.
ATTACKERS
10.
IMPERSONATION
11.
CREDENTIALS
12.
PHISHING
13.
TRUST
14.
VOICE
15.
VIDEO
16.
MEETINGS
17.
TEXT
18.
PHONE
19.
MALICIOUS
20.
REQUESTS