Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?
A. Collusion
B. Impersonation
C. Pharming
D. Transitive Access
Answer: B. Impersonation
Computer Science & Information Technology
You might also like to view...
Which of the following is not a look-and-feel?
a. Windows. b. Motif. c. Metal. d. None of the above.
Computer Science & Information Technology
Which three PCIe cards would work in a PCIe x8 expansion slot? (Select three.)
A) PCIe x1 B) PCIe x2 C) PCIe x3 D) PCIe x4 E) PCIe x6 F) PCIe x7
Computer Science & Information Technology
The default arrangement for data in a report created from two or more tables or queries is that data is grouped by field. ____________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In a true 3-D chart, a third axis, called the _____, lets you compare data points across both categories and values.?
A. ?d-axis B. ?tertiary-axis C. ?z-axis D. ?dimensional-axis
Computer Science & Information Technology