Which of the following is an attack where Pete spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
A. Tailgating
B. Replay attack
C. Virus
D. Social engineering
Answer: D. Social engineering
Computer Science & Information Technology
You might also like to view...
How can policies implemented inWindows XP lead to priority inversion? How does Windows XP handle priority inversion? In what ways is this a good policy?What are its drawbacks?
What will be an ideal response?
Computer Science & Information Technology
Goal Seek is an example of a what-if analysis tool
Indicate whether the statement is true or false
Computer Science & Information Technology
Control margin is the space between the outside borders of adjacent controls. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Every JavaScript statement ends with a(n) __________.
A. colon ( : ) B. period ( . ) C. semicolon ( ; ) D. comma ( , )
Computer Science & Information Technology