Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?

a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data


Answer D. Social Engineering is basically using people skills to gather information

Computer Science & Information Technology

You might also like to view...

Explain what a diagram 0 is and how it is used.

What will be an ideal response?

Computer Science & Information Technology

Which of the following log security levels would indicate the most immediate action would be needed, such as in an emergency?

A) 0 B) 1 C) 6 D) 7

Computer Science & Information Technology

A(n) ____________________ is a programmer who breaks into computer systems in an unauthorized way.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To create an attractive placement of an images always set specific sizes for the image height and image width.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology