____ attacks may involve individuals posing as new employees or as current employees desperately requesting assistance to avoid getting fired.
A. Buffer overflow
B. Cracking
C. Social engineering
D. Spoofing
Answer: C
You might also like to view...
Method getSelectedValues of class JList returns:
a. an array of ints representing the indices of the selected items. b. an array of doubles representing the indices of the selected items. c. an array of Strings representing the selected items. d. an array of Objects representing the selected items.
In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.
A. ?aid in product transformation B. ?are a means of producing output C. ?are a means of providing input into the process D. ?all of these
A _________ is a collection of related data.
A) ?record ? B) ?file ? C) ?database ? D) ?field
Which of the following is false regarding VRML?
a) It is a markup language. b) It is purely a text language. c) It is an extension of the Microsoft ActiveX controls. d) Its files have the extension ".wrl"