Which of the following could an attacker use to perpetrate a social engineering attack? (Choose two.)
Limited Time Offer
25%
Off
Leatha
11 days agoErick
12 days agoIzetta
13 days ago