Which of the following can prevent social engineering?

A. Caller id
B. Only give your password to special people
C. Watch out for shoulder surfers
D. all of the above


Ans: A, C

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. A common way to perform synchronization is to use Java’s built-in monitors. b. Every object has a monitor and a monitor lock (or intrinsic lock). c. A monitor ensures that its object’s monitor lock is held by a maximum of two threads at a time. d. Monitors and monitor locks can be used to enforce mutual exclusion.

Computer Science & Information Technology

Facebook was introduced as a local site for connecting students at ________

A) Notre Dame University B) Princeton University C) University of Pennsylvania D) Harvard University

Computer Science & Information Technology

When the AVERAGE function is used, the division operation is NOT visible in the formula bar, as it is part of the predefined function

Indicate whether the statement is true or false.

Computer Science & Information Technology

When you use the address element, the address text is displayed in ___ by default.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology