Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?
A. fingerprinting
B. footprinting
C. zone transferring
D. social engineering
Answer: D
You might also like to view...
The criteria used in the design of the __________ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.
A) ?Avalanche Attack B) ?Data Encryption Standard C) ?Product Cipher ? D) ?Substitution Key
Most JavaScript commands and names are not case sensitive.
Answer the following statement true (T) or false (F)
Use linear interpolation to estimate the time when total production reached 14,000 units.
Table of data 3:10 P.M. 11240 1 ??:?? P.M. 14000 p 4:07 P.M. 14371 2
What IDS component performs trend analysis and stores the IP address and information about the attacker?
a. Network sensors b. Report analysis c. Database and storage d. Response box