_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.

a. Dumpster diving
b. Cyberterrorism
c. Social engineering attack
d. Organizational identity theft


Answer: c. Social engineering attack

Computer Science & Information Technology

You might also like to view...

Consider the following statements:class shape{public:virtual void draw() = 0;virtual void move(double x, double y) = 0;...};The code above is an example of a(n) ____________________ class definition.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In order for the browser to find the index_Resources folder, which of the following is true?

A. The index_Resources folder must be uploaded to the same ISP as the one hosting the website B. The SWF file code must include a link to the index_Resources folder C. The index_Resources folder, index.html file, and index.swf file must all be in the same directory D. The index.html file and the index.swf file must be in the index_Resources folder

Computer Science & Information Technology

The underlying data structure used by the computer during recursion is a:

a. queue b. linked list c. tree d. stack

Computer Science & Information Technology

True or false: when a user runs an FTP application, the application acts as both a client and server. Explain your answer.

What will be an ideal response?

Computer Science & Information Technology