The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data

a. Phishing
b. Key logging
c. Social engineering
d. None of the above

Answer C.

Computer Science & Information Technology

You might also like to view...

If the Repeat Count and Repeat Expression action arguments are left blank, the macro will run ________ time(s)

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ schemes are rules that combine data values in specific formats and locations to generate new data values

Fill in the blank(s) with correct word

Computer Science & Information Technology