_____________ = voice + phishing.
(a) Algo-based phishing
(b) Vishing
(c) Domain Phishing
(d) Email-based phishing
The question was asked in a job interview.
This is a very interesting question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security