| Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
Choose the correct option from below list
(1)Footprinting
(2)Reconnaissance
(3)Social Engineering
(4)Fingerprinting
Answer:-(3)Social Engineering | | |