________ is a totally non-technical process in which an attacker tricks a person and obtains confidential information in such a way that the target is unaware of the fact that someone is stealing confidential information.

A. Email tracking
B. Information tracking
C. Competitive intelligence
D. Social engineering


Answer: D. Social engineering

Computer Science & Information Technology

You might also like to view...

If data in the main program is needed by a subprogram, the value of that data is passed to, or __________ by, the subprogram.

Fill in the blank(s) with correct word

Computer Science & Information Technology

If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B. A _________ center is responsible for distributing keys to pairs of users as needed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a mathematical formula refers to a cell that contains a text value rather than a number, you will get a(n) ________ error

A) #REF! B) #NULL! C) #VALUE! D) #N/A

Computer Science & Information Technology

Solve the linear equation. If necessary, answer no solution.

What will be an ideal response?

Computer Science & Information Technology