What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

A. Internal virus
B. Inside attack
C. Hacking
D. Social engineering


Answer: D

Computer Science & Information Technology

You might also like to view...

When designing an expression for a calculated field, the name of the calculated field followed by a(n):

A) Parentheses B) Bracket C) Exclamation Point D) Colon

Computer Science & Information Technology

There are Word templates available to help you create a resume

Indicate whether the statement is true or false

Computer Science & Information Technology

Recorded macros can be viewed in the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can move large pieces of code and content inside a comment to ____.

A. make it invisible on the page B. temporarily hide it C. Neither A or B. D. Both A and B.

Computer Science & Information Technology