Which of the following, also known as social engineering, is a methodology by which an individual impersonates someone else to extract sensitive information from them?

A) Pretexting
B) System infiltration
C) Corporate identity theft
D) Denial of service


A) Pretexting

Computer Science & Information Technology

You might also like to view...

A shape cannot have a picture added as a shape fill

Indicate whether the statement is true or false

Computer Science & Information Technology

____ templates include multiple pages and folders in an organized site structure.

A. Site B. Page C. Style D. Image

Computer Science & Information Technology

One of the easiest ways to improve security on a wireless network is to use WPA instead of WEP

Indicate whether the statement is true or false.

Computer Science & Information Technology

In a Chart in Microsoft Word worksheet, the group of cells that is used to create a chart is the:

What will be an ideal response?

Computer Science & Information Technology