Which of the following could an attacker use to perpetrate a social engineering attack? (Choose two.)
Limited Time Offer
25%
Off
Erick
1 hours agoIzetta
1 days ago