________ is gaining someone's trust by pretending you are someone else.
A. Pretexting
B. Authentication
C. Switching
D. Phishing
Answer: A
You might also like to view...
Which of the following is true about extended IP ACLs?
A. the ‘established' keyword is not available except on standard ACLs B. you can apply multiple outbound ACLs on a single interface C. the default inverse mask for the source is 0.0.0.0 D. they should be applied to an interface close to the traffic source
What will be displayed by the statements below?
``` char s1[8] = "petunia", s2[9] = "marigold"; char tmp1[10], tmp2[20]; strcpy(tmp2, s1); strcat(tmp2, s2); strncpy(tmp1, &tmp2[5], 6); tmp1[6] = '\0'; printf("b%s\n", tmp1); ``` a. iamari b. biamari c. oldpet d. boldpet e. none of the above
________ is the data transfer rate of a network: measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)
a.Bandwidth b.Broadband c.LTE d.WiMAX
Most documents are printed in ____ orientation.
A. landscape B. sideways C. upright D. portrait