A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of _____.

A. social pathology
B. data encryption
C. social engineering
D. data mining


Answer: C

Business

You might also like to view...

A(n) ________ need is a need that the consumer explicitly verbalizes

A) stated B) affirmative C) unsought D) delight E) secret

Business

In an attempt to reduce product thefts in retail stores, companies include antitheft methodology, such as bar coding or magnetic stripes, in the package design that discourages shoplifting. Which of the following package objectives does this exemplify?

A. harmony B. protection C. aesthetics D. communication E. usage promotion

Business

Which of the following is not a pre-transaction element of customer service?

a. Customer service authority b. Customer service policies c. Information system development d. Order entry

Business

For equivalent amounts of taxable income, the total tax liability of a couple using the married filing jointly status:

A. Will be less than single filing status. B. Will be more than married filing separately status. C. Will be more than single filing status. D. Cannot be determined with the information provided.

Business