The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data

a. Phishing
b. Key logging
c. Social engineering
d. None of the above


Answer C.

Computer Science & Information Technology

You might also like to view...

The arrow operator (->) combines the actions of which two operators?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ can display a user-friendly list that is either linked to another field in a related table or a value list

Fill in the blank(s) with correct word

Computer Science & Information Technology

If you make a mistake when entering a hyperlink, you can edit the link by clicking and correcting it

Indicate whether the statement is true or false

Computer Science & Information Technology

Charms include Mail and SkyDrive

Indicate whether the statement is true or false

Computer Science & Information Technology