What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
A. Internal virus
B. Inside attack
C. Hacking
D. Social engineering
Answer: D
Computer Science & Information Technology
You might also like to view...
When designing an expression for a calculated field, the name of the calculated field followed by a(n):
A) Parentheses B) Bracket C) Exclamation Point D) Colon
Computer Science & Information Technology
There are Word templates available to help you create a resume
Indicate whether the statement is true or false
Computer Science & Information Technology
Recorded macros can be viewed in the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can move large pieces of code and content inside a comment to ____.
A. make it invisible on the page B. temporarily hide it C. Neither A or B. D. Both A and B.
Computer Science & Information Technology