CompTIA PenTest+ PT0-002 Practice Question
During a social engineering attack, an adversary decides to tailor their communication style to match that of their target, trying to establish common ground based on shared hobbies and professional interests. Which principle of influence is the attacker primarily exploiting in this situation?
Social proof
Likeness
Reciprocity
Consistency