An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

A. Data mining
B. Social engineering
C. Intrusion detection
D. Hacking


Answer: B. Social engineering

Computer Science & Information Technology

You might also like to view...

You can select slide objects in order to delete them simultaneously by pressing the ____ key as you click each object.

A. SHIFT B. ESC C. ALT D. TAB

Computer Science & Information Technology

Which of the following indicates that an error has occurred in an Excel calculation??

A. ?An error value beginning with a dollar sign ($) appears in the cell. B. ?A small green triangle appears in the upper-left corner of the cell. C. ?Excel returns the calculation result as zero. D. ?Excel displays the message ""An error has occurred.""

Computer Science & Information Technology

You can sort a table in ascending or descending order

Indicate whether the statement is true or false

Computer Science & Information Technology

Data encapsulation hides all internal code, variables, and logic from the outside world, therefore restricting acces to any outside callers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology