Which of these is an example of social engineering?
A. Asking for a username and password over the phone
B. Using someone else's unsecured wireless network
C. Hacking into a router
D. A virus
Answer: A. Asking for a username and password over the phone
You might also like to view...
The JPA annotation @Basic specifies whether the column is optional and whether the corresponding data should loaded ________ (i.e., only when the data is accessed through the entity object) or ________ (i.e., loaded immediately when the entity object is created).
a. lazily, actively b. slowly, eagerly c. lazily, eagerly d. idly, actively
Algorithms must be definite. They must specify ordered steps, including details on how to _______________.
Fill in the blank(s) with the appropriate word(s).
A collection of frequently used styles is called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
A line chart is useful for showing trends over time
Indicate whether the statement is true or false