Cоmpаny A sends а fictitiоus оverdue invoice thаt appears legitimate via email to Company B, a large corporation. Company A hopes that Company B will comply and make the payment without investigating. What type of attack is this? Select two.