Before conducting a security test by using social-engineering tactics, what should you do?
a. Set up an appointment.
b. Document all findings.
c. Get written permission from the person who hired you to conduct the security test.
d. Get written permission from the department head.
Ans: c. Get written permission from the person who hired you to conduct the security test.
You might also like to view...
A column in an Access table is called a characteristic
Indicate whether the statement is true or false
In a mail merge, the main document and the data source, create a third file, a ____, consisting of multiple personalized letters.
A. merged document B. field document C. data source D. main document
Illustrate the use of a write-blocker on a Windows environment.
What will be an ideal response?
Disk duplexing is the same as what type of disk redundancy?
A. Disk striping with parity B. Disk leveling C. Disk mirroring D. Disk high-level striping