Before conducting a security test by using social-engineering tactics, what should you do?

a. Set up an appointment.
b. Document all findings.
c. Get written permission from the person who hired you to conduct the security test.
d. Get written permission from the department head.


Ans: c. Get written permission from the person who hired you to conduct the security test.

Computer Science & Information Technology

You might also like to view...

A column in an Access table is called a characteristic

Indicate whether the statement is true or false

Computer Science & Information Technology

In a mail merge, the main document and the data source, create a third file, a ____, consisting of multiple personalized letters.

A. merged document B. field document C. data source D. main document

Computer Science & Information Technology

Illustrate the use of a write-blocker on a Windows environment.

What will be an ideal response?

Computer Science & Information Technology

Disk duplexing is the same as what type of disk redundancy?

A. Disk striping with parity B. Disk leveling C. Disk mirroring D. Disk high-level striping

Computer Science & Information Technology