In which type of social engineering attack does the attacker pretend to be someone else?
a. Important user
b. Third-party authorization
c. Masquerading
d. In person
ANS: C
Computer Science & Information Technology
You might also like to view...
The way moves of identical text from one position to another position display can be changed in the Track Changes Options dialog box.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
__________ is a network project that preceded the Internet.
A. NIST B. ARPANET C. FIPS D. DES
Computer Science & Information Technology
When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it.
a. true b. false
Computer Science & Information Technology
How many channels does 802.11g provide for communication with clients,
a. 20 b. 12 c. 10 d. 3 e. 8
Computer Science & Information Technology