How can social engineering be used to get access to a sensitive file?

What will be an ideal response?


Answer: A hacker calls a secretary claiming to be her boss, then asks for sensitive information or restricted files.

Computer Science & Information Technology

You might also like to view...

How would you best describe the FAT12 file system?

a. It is one of the Linux file systems from a very early distribution. b. It was an early file system used by Microsoft that continued to be used in later versions for formatting floppy disks. c. It was the default file system used by Unix for many years. d. Very much like the unicorn, this file system was long rumored to exist, but was never actually seen in the real world.

Computer Science & Information Technology

To change the order of a picture and move it to the top of the stack, you click the Bring to Front button in the:

A) Arrange group on the Format tab. B) Arrange group on the Design tab. C) Adjust group on the Design tab. D) Adjust group on the Format tab.

Computer Science & Information Technology

COGNITIVE ASSESSMENT Antivirus programs look for a specific pattern of virus code. What is this pattern called?

A. virus map B. virus signature C. virus index D. virus identifier

Computer Science & Information Technology

How should the constructor for an array-based stack data type be designed to support user choice for stack size?

What will be an ideal response?

Computer Science & Information Technology