____ relies on tricking and deceiving someone to access a system.
A. Social engineering
B. Wardriving
C. Warchalking
D. Wireless site mapping
Answer: A
You might also like to view...
Which of the following is NOT a criteria for open source software?
A) There can be no discrimination against persons or groups. B) There is a fee for redistribution. C) There can be no discrimination against fields of endeavor. D) The license must not be specific to the product.
A computerized DBMS is ____ than using file folders.
A. more flexible B. more accurate C. much faster D. all of the above
Duplicate IP addresses can occur if a device has been manually assigned a static IP address that is within the range of IP addresses that the DHCP server regulates
Indicate whether the statement is true or false
NetBus and Anti-Spyware 2011 are examples of which of the following?
a. Antispyware programs b. Trojans c. Viruses d. Antivirus programs