An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?
A. Data mining
B. Social engineering
C. Intrusion detection
D. Hacking
Answer: B. Social engineering
You might also like to view...
You can select slide objects in order to delete them simultaneously by pressing the ____ key as you click each object.
A. SHIFT B. ESC C. ALT D. TAB
Which of the following indicates that an error has occurred in an Excel calculation??
A. ?An error value beginning with a dollar sign ($) appears in the cell. B. ?A small green triangle appears in the upper-left corner of the cell. C. ?Excel returns the calculation result as zero. D. ?Excel displays the message ""An error has occurred.""
You can sort a table in ascending or descending order
Indicate whether the statement is true or false
Data encapsulation hides all internal code, variables, and logic from the outside world, therefore restricting acces to any outside callers.
Answer the following statement true (T) or false (F)