In which type of social engineering attack does the attacker pretend to be someone else?

a. Important user
b. Third-party authorization
c. Masquerading
d. In person


ANS: C

Computer Science & Information Technology

You might also like to view...

The way moves of identical text from one position to another position display can be changed in the Track Changes Options dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

__________ is a network project that preceded the Internet.

A. NIST B. ARPANET C. FIPS D. DES

Computer Science & Information Technology

When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it.

a. true b. false

Computer Science & Information Technology

How many channels does 802.11g provide for communication with clients,

a. 20 b. 12 c. 10 d. 3 e. 8

Computer Science & Information Technology