Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?
Correct Answer: C
Explanation
Email is one of the most common and effective threat vectors used by malicious actors to impersonate a company and conduct phishing or spear phishing attacks. Phishing is a type of social engineering attack where an attacker sends fraudulent emails that appear to be from a legitimate source, such as a company, a bank, a government agency, etc., and tries to trick the recipients into clicking on malicious links, opening malicious attachments, or providing sensitive information. Email can appear to be more legitimate than other threat vectors because it can use spoofed sender addresses, logos, signatures, or domain names that resemble the real ones.