Which term refers to when people are manipulated into giving access to network resources?

A. Hacking
B. Social engineering
C. Phishing
D. Cracking


Answer: B. Social engineering

Computer Science & Information Technology

You might also like to view...

An easy way to create an absolute cell reference is to press ________ on your keyboard

A) Ctrl + Alt + Del B) F4 C) F3 D) Ctrl + Shift

Computer Science & Information Technology

A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers

a. DNS b. CGI c. domain name d. HTML

Computer Science & Information Technology

The ________ property of the XMLHttpRequest object is the numeric http status code returned by the server.

(a) statusText (b) status (c) statusCode (d) responseText

Computer Science & Information Technology

When battery loss occurs to the CMOS battery, what continues to happen to configuration settings?

a. Configuration settings are still available. b. CMOS is no longer useable. c. Configuration settings are lost. d. Computer continues to reboot.

Computer Science & Information Technology