the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


social engineering

Computer Science & Information Technology

You might also like to view...

The command java invokes the ___________, which executes Java programs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

List and describe what a typical AUP contains.

What will be an ideal response?

Computer Science & Information Technology

If a computer is performing slowly due to file fragmentation, what Windows tool can be utilized to rearrange fragments?

A. Computer Management B. Defrag and Optimization tool C. Defraggler D. Disk Cleanup

Computer Science & Information Technology

Which tool is best for formal or lengthy communication?

a. Email b. SMS c. IM d. Screen sharing

Computer Science & Information Technology