the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
adware
digital certificate
grayware
keylogger
dictionary attack
social engineering
tailgating
Trojan
zombie
worm
social engineering
Computer Science & Information Technology
You might also like to view...
The command java invokes the ___________, which executes Java programs.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
List and describe what a typical AUP contains.
What will be an ideal response?
Computer Science & Information Technology
If a computer is performing slowly due to file fragmentation, what Windows tool can be utilized to rearrange fragments?
A. Computer Management B. Defrag and Optimization tool C. Defraggler D. Disk Cleanup
Computer Science & Information Technology
Which tool is best for formal or lengthy communication?
a. Email b. SMS c. IM d. Screen sharing
Computer Science & Information Technology