Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?

A. Collusion
B. Impersonation
C. Pharming
D. Transitive Access


Answer: B. Impersonation

Computer Science & Information Technology

You might also like to view...

Which of the following is not a look-and-feel?

a. Windows. b. Motif. c. Metal. d. None of the above.

Computer Science & Information Technology

Which three PCIe cards would work in a PCIe x8 expansion slot? (Select three.)

A) PCIe x1 B) PCIe x2 C) PCIe x3 D) PCIe x4 E) PCIe x6 F) PCIe x7

Computer Science & Information Technology

The default arrangement for data in a report created from two or more tables or queries is that data is grouped by field.  ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a true 3-D chart, a third axis, called the _____, lets you compare data points across both categories and values.?

A. ?d-axis B. ?tertiary-axis C. ?z-axis D. ?dimensional-axis

Computer Science & Information Technology