Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?

A. fingerprinting
B. footprinting
C. zone transferring
D. social engineering


Answer: D

Computer Science & Information Technology

You might also like to view...

The criteria used in the design of the __________ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.

A) ?Avalanche Attack B) ?Data Encryption Standard C) ?Product Cipher ? D) ?Substitution Key

Computer Science & Information Technology

Most JavaScript commands and names are not case sensitive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Use linear interpolation to estimate the time when total production reached 14,000 units.

Table of data 3:10 P.M. 11240 1 ??:?? P.M. 14000 p 4:07 P.M. 14371 2

Computer Science & Information Technology

What IDS component performs trend analysis and stores the IP address and information about the attacker?

a. Network sensors b. Report analysis c. Database and storage d. Response box

Computer Science & Information Technology