Which of the following qualifies as social engineering?

a. the illegal copying and distribution of a newly released theatrical film
b. a brute force search for an employee's password
c. befriending a company's cleaning crew to gain access to rooms and buildings
d. using an anonymizer to conduct hard-to-track Internet searches


Answer: c

Computer Science & Information Technology

You might also like to view...

LinkLabels are used to:

a) organize a group of labels b) bring the user to a desired location c) allow many labels to be modified during runtime all at once d) All of the above

Computer Science & Information Technology

When an existing file is opened for Output

(A) new data are added at the end of the existing file. (B) the file is erased completely and new data is added at the beginning of the file. (C) Visual Basic generates an error message and stops program execution. (D) data may be read from it.

Computer Science & Information Technology

Sound cards require a device driver

Indicate whether the statement is true or false

Computer Science & Information Technology

You have been hired as a security analyst by your company. Your company decides to deploy an ERP solution. Several department heads express concerns that ERP data will be shared with all departments. In addition, management is concerned that attackers will be able to access the ERP data. You need to deploy the ERP solution while providing the highest level of security. Which is the BEST location

to deploy the ERP solution? A. in a VLAN B. on a DMZ C. in a VPN D. on a SAN

Computer Science & Information Technology