The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data
a. Phishing
b. Key logging
c. Social engineering
d. None of the above
Answer C.
Computer Science & Information Technology
You might also like to view...
The arrow operator (->) combines the actions of which two operators?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ can display a user-friendly list that is either linked to another field in a related table or a value list
Fill in the blank(s) with correct word
Computer Science & Information Technology
If you make a mistake when entering a hyperlink, you can edit the link by clicking and correcting it
Indicate whether the statement is true or false
Computer Science & Information Technology
Charms include Mail and SkyDrive
Indicate whether the statement is true or false
Computer Science & Information Technology