A past exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
a. War driving
b. Shoulder surfing
c. Phishing
d. Social Engineering
Answer: d. Social Engineering
You might also like to view...
Answer the following statements true (T) or false (F)
1. Once you have created an instance of a structure, you can access its fields using the dot operator (a period). 2. You can use the assignment operator (=) to assign one structure object to another. 3. Unlike other types of objects, you cannot pass a structure object as an argument to a method. 4. You cannot perform comparison operations directly on structure objects. 5. When you create a structure array, each element of the array is structure instance and the fields of each instance are initialized to either zero or null (for fields that are reference variables).
A spin lock (see Bacon [2002]) is a boolean variable accessed via an atomic test-and-set instruction, which is used to obtain mutual exclusion. Would you use a spin lock to obtain mutual exclusion between threads on a single-processor computer?
What will be an ideal response?
What minimal operating system has only the services needed to access the network, work with files, copy disk images, and jump-start a Windows installation?
A. Windows Image File B. Windows Preinstallation Environment C. Windows Preboot Environment D. Windows Network Boot
Internal efficiency is cited as one reason for separating the data warehouse from the operational database. Explain.
What will be an ideal response?