Which of these is an example of social engineering?

A. Asking for a username and password over the phone
B. Using someone else's unsecured wireless network
C. Hacking into a router
D. A virus


Answer: A. Asking for a username and password over the phone

Computer Science & Information Technology

You might also like to view...

The JPA annotation @Basic specifies whether the column is optional and whether the corresponding data should loaded ________ (i.e., only when the data is accessed through the entity object) or ________ (i.e., loaded immediately when the entity object is created).

a. lazily, actively b. slowly, eagerly c. lazily, eagerly d. idly, actively

Computer Science & Information Technology

Algorithms must be definite. They must specify ordered steps, including details on how to _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A collection of frequently used styles is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A line chart is useful for showing trends over time

Indicate whether the statement is true or false

Computer Science & Information Technology