Which of the following, also known as social engineering, is a methodology by which an individual impersonates someone else to extract sensitive information from them?
A) Pretexting
B) System infiltration
C) Corporate identity theft
D) Denial of service
A) Pretexting
Computer Science & Information Technology
You might also like to view...
A shape cannot have a picture added as a shape fill
Indicate whether the statement is true or false
Computer Science & Information Technology
____ templates include multiple pages and folders in an organized site structure.
A. Site B. Page C. Style D. Image
Computer Science & Information Technology
One of the easiest ways to improve security on a wireless network is to use WPA instead of WEP
Indicate whether the statement is true or false.
Computer Science & Information Technology
In a Chart in Microsoft Word worksheet, the group of cells that is used to create a chart is the:
What will be an ideal response?
Computer Science & Information Technology