Which of the following is an attack where Pete spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?

A. Tailgating
B. Replay attack
C. Virus
D. Social engineering


Answer: D. Social engineering

Computer Science & Information Technology

You might also like to view...

How can policies implemented inWindows XP lead to priority inversion? How does Windows XP handle priority inversion? In what ways is this a good policy?What are its drawbacks?

What will be an ideal response?

Computer Science & Information Technology

Goal Seek is an example of a what-if analysis tool

Indicate whether the statement is true or false

Computer Science & Information Technology

Control margin is the space between the outside borders of adjacent controls. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Every JavaScript statement ends with a(n) __________.

A. colon ( : ) B. period ( . ) C. semicolon ( ; ) D. comma ( , )

Computer Science & Information Technology