Slayer17171go Slayer17171go Computers and Technology Answered when an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?