____ relies on tricking and deceiving someone to access a system.

A. Social engineering
B. Wardriving
C. Warchalking
D. Wireless site mapping


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a criteria for open source software?

A) There can be no discrimination against persons or groups. B) There is a fee for redistribution. C) There can be no discrimination against fields of endeavor. D) The license must not be specific to the product.

Computer Science & Information Technology

A computerized DBMS is ____ than using file folders.

A. more flexible B. more accurate C. much faster D. all of the above

Computer Science & Information Technology

Duplicate IP addresses can occur if a device has been manually assigned a static IP address that is within the range of IP addresses that the DHCP server regulates

Indicate whether the statement is true or false

Computer Science & Information Technology

NetBus and Anti-Spyware 2011 are examples of which of the following?

a. Antispyware programs b. Trojans c. Viruses d. Antivirus programs

Computer Science & Information Technology