________ is gaining someone's trust by pretending you are someone else.

A. Pretexting
B. Authentication
C. Switching
D. Phishing


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is true about extended IP ACLs?

A. the ‘established' keyword is not available except on standard ACLs B. you can apply multiple outbound ACLs on a single interface C. the default inverse mask for the source is 0.0.0.0 D. they should be applied to an interface close to the traffic source

Computer Science & Information Technology

What will be displayed by the statements below?

``` char s1[8] = "petunia", s2[9] = "marigold"; char tmp1[10], tmp2[20]; strcpy(tmp2, s1); strcat(tmp2, s2); strncpy(tmp1, &tmp2[5], 6); tmp1[6] = '\0'; printf("b%s\n", tmp1); ``` a. iamari b. biamari c. oldpet d. boldpet e. none of the above

Computer Science & Information Technology

________ is the data transfer rate of a network: measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)

a.Bandwidth b.Broadband c.LTE d.WiMAX

Computer Science & Information Technology

Most documents are printed in ____ orientation.

A. landscape B. sideways C. upright D. portrait

Computer Science & Information Technology