Using which Social engineering principle might an attacker impersonate a CEO of a company?

A. Scarcity
B. Authority
C. Urgency
D. Trust


Answer: B

Computer Science & Information Technology

You might also like to view...

What well-known command prompt command is an alias for Get-ChildItem?

A. copy B. cd C. move D. dir

Computer Science & Information Technology

Covariance has two functions associated with it - COVARIANCE.P and COVARIANCE.S

Indicate whether the statement is true or false

Computer Science & Information Technology

____ configurations connects each peer trust anchor to a hub.

A. Tree B. Hub C. Mesh D. Line

Computer Science & Information Technology

When working with the text-shadow style, ____ shadows are applied from first to last, with the first shadow listed displayed on top of succeeding shadows.

A. single B. multiple C. double D. blurred

Computer Science & Information Technology