The type of attack which has occurred in this scenario is known as credential harvesting.
<h3>What is
credential harvesting?</h3>
Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):
In conclusion, the type of attack which was used in this scenario is known as credential harvesting.
Read more on phishing here: brainly.com/question/23850673
#SPJ1
Several of eap protocols use encryption function, which creates a ciphertext from cleartext.
<span />
Answer: M and E
Explanation: Hope this helps