Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?
a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data
Answer D. Social Engineering is basically using people skills to gather information
You might also like to view...
Explain what a diagram 0 is and how it is used.
What will be an ideal response?
Which of the following log security levels would indicate the most immediate action would be needed, such as in an emergency?
A) 0 B) 1 C) 6 D) 7
A(n) ____________________ is a programmer who breaks into computer systems in an unauthorized way.
Fill in the blank(s) with the appropriate word(s).
To create an attractive placement of an images always set specific sizes for the image height and image width.
Answer the following statement true (T) or false (F)