________ is a totally non-technical process in which an attacker tricks a person and obtains confidential information in such a way that the target is unaware of the fact that someone is stealing confidential information.
A. Email tracking
B. Information tracking
C. Competitive intelligence
D. Social engineering
Answer: D. Social engineering
You might also like to view...
If data in the main program is needed by a subprogram, the value of that data is passed to, or __________ by, the subprogram.
Fill in the blank(s) with correct word
If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B. A _________ center is responsible for distributing keys to pairs of users as needed.
Fill in the blank(s) with the appropriate word(s).
If a mathematical formula refers to a cell that contains a text value rather than a number, you will get a(n) ________ error
A) #REF! B) #NULL! C) #VALUE! D) #N/A
Solve the linear equation. If necessary, answer no solution.
What will be an ideal response?