What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
A. phreaking
B. hacking
C. social engineering
D. reverse engineering
Answer: C
You might also like to view...
The functions begin() and end() are known as STL____________________ functions.
Fill in the blank(s) with the appropriate word(s).
When you pass a variable name to the echo statement, you must enclose the variable name in double quotation marks.
Answer the following statement true (T) or false (F)
To arrange workbooks on top of each other with title bars visible, click the ____ button.
A. Tiled B. Stacked C. Vertical D. Cascade
A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?
A. The gateway is misconfigured on the new router. B. The subnet mask is incorrect on the new router. C. The gateway is misconfigured on the edge router. D. The SSID is incorrect on the new router.