Sara, an attacker, calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an example of which of the following?
A. Shoulder surfing
B. Whaling
C. Tailgating
D. Impersonation
Answer: D. Impersonation
You might also like to view...
Dekker’s Algorithm, testAndSet, swap, and the semaphore operations P and V may all be used to enforce mutual exclusion. Compare and contrast these various schemes. Consider their respective advantages and disadvantages.
What will be an ideal response?
Draw a use case diagram for an ATM (cash terminal). The system includes two actors: a customer, who draws money from his account either on the money chip on his bank card or in cash, and a security man, who fills money into the ATM.
Use cases should include: DrawCash, LoadMoneyChip, CheckAccountBallance, FillATM. Also include the following exceptional cases: OutOfMoney, TransactionAborted (i.e., customer selected the cancel button without completing the transaction) and MoneyChipOutOfOrder. Remark: It is possible to use inheritance between use cases! Write the flow of events and specify all fields for the use case CheckAccountBalance that you drew before. Specify relationships.
Define Cisco IOS.
What will be an ideal response?
Answer the following statements true (T) or false (F)
1) Records in random-access files must be of uniform length. 2) Module cPickle performs more efficiently than does module pickle because cPickle is written in Python. 3) Serialization converts complex objects to a set of bytes. 4) Method sys.exit returns 1 by default to signify that no errors occurred. 5) Sequential-access files are inappropriate for instant-access applications in which records must be located quickly.