Which term refers to when people are manipulated into giving access to network resources?
A. Hacking
B. Social engineering
C. Phishing
D. Cracking
Answer: B. Social engineering
You might also like to view...
An easy way to create an absolute cell reference is to press ________ on your keyboard
A) Ctrl + Alt + Del B) F4 C) F3 D) Ctrl + Shift
A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers
a. DNS b. CGI c. domain name d. HTML
The ________ property of the XMLHttpRequest object is the numeric http status code returned by the server.
(a) statusText (b) status (c) statusCode (d) responseText
When battery loss occurs to the CMOS battery, what continues to happen to configuration settings?
a. Configuration settings are still available. b. CMOS is no longer useable. c. Configuration settings are lost. d. Computer continues to reboot.