Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?

A. A social engineer
B. A dumpster diver
C. An insider
D. A spammer


Answer: C

Business

You might also like to view...

The initial step in questionnaire checking involves a check of all questionnaires for completeness and interviewing quality

Indicate whether the statement is true or false

Business

Discuss the effects of transactions involving derivatives and the fair value option on the statements of cash flows

Business

A) To what value can the per bottle profit on red nail polish drop before the solution (product mix) would change?

b) By how much can the per bottle profit on green nail polish increase before the solution (product mix) would change? What will be an ideal response?

Business

Which of the following are potential drawbacks of a decentralized federation structure, where a parent company establishes different national subsidiaries?

a. Decisions may be made wholly in terms of local relevancies, which may not always serve the interests of the centre b. Duplication of effort and cost inefficiencies as each periphery replicates functions locally, on a small and more costly scale c. Resistance to innovations from subsidiaries who view themselves as rival centres in the federation d. All of the above

Business