Which technique used by a threat actor is known as spam?
Select one:

An attacker observes websites that a targeted group visits, and herds them into an infected website
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Weaponized emails that claim to come from a legitimate sender
Fraudulent messages that target a specific role or person within an organization

  Discussion forum


Leave an answer