Describe conformity as a social engineering technique.
What will be an ideal response?
This method hinges on the general tendency of people to believe that an apparent similarity between themselves and another (unknown) person is an actual similarity. The hacker convinces the victim that they have a lot in common and that they share the same values. The hacker becomes the victim's good friend by appearing honest,trustworthy,and friendly. This is a person in whom one may truly confide. Once the information is garnered, the "good friend" just disengages.
You might also like to view...
A cell is referred to by its cell ____.
A. reference B. index C. menu D. placeholder
________ is the management activity involved in enterprise computing that deals with setting objectives and strategies
A) Controlling B) Organizing C) Leading D) Planning
Which of the following is a limitation of sharing workbooks?
A) The workbook cannot be printed. B) Track changes is not supported. C) 125 users can access at once. D) Workbooks that contain tables may not be shared.
The correct HTML code to create a reset button is ____.
A.