slayer17171 slayer17171 04-11-2022 Computers and Technology contestada when an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?