What specific science discipline do most social engineering attacks rely on when they are being used?

A. psychiatry
B. criminology
C. psychology
D. engineering


Answer: C

Computer Science & Information Technology

You might also like to view...

You would select Yes for the ____________________ section property to print a report section all on one page.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Define a structure type catNum to represent a catalog number consisting of a two- or three-character category code followed by an integer. Then, define a structure type catEntry to represent a catalog entry. Each entry has a catalog number, a de- scription, a wholesale price, and a retail price.

What will be an ideal response?

Computer Science & Information Technology

CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

a. Establish a theory of probable cause. b. Document findings, actions, and outcomes. c. Test the theory to determine the cause. d. Establish a plan of action to resolve the problem and implement the solution.

Computer Science & Information Technology

A penetration tester finds that a company’s login credentials for the email client were being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?

A. Enable IPSec and configure SMTP. B. Enable SSH and LDAP credentials. C. Enable MIME services and POP3. D. Enable an SSL certificate for IMAP services.

Computer Science & Information Technology