____ relies on tricking and deceiving someone to access a system.

A. Social engineering
B. Wardriving
C. Warchalking
D. Wireless site mapping


Answer: A

Computer Science & Information Technology

You might also like to view...

A/An ____________ can change the length while the program is running.

a. Array b. ArrayList c. Type parameter d. None of the above

Computer Science & Information Technology

When should an interviewer compose a written interview report and why?

What will be an ideal response?

Computer Science & Information Technology

Windows 7 uses approximately ________ lines of code

A) 500,000 B) 2 billion C) 50 million D) 100,000

Computer Science & Information Technology

Dashed lines that display on your slide when you are moving an object to help you with alignment are ________

Fill in the blank(s) with correct word

Computer Science & Information Technology