The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data
a. Phishing
b. Key logging
c. Social engineering
d. None of the above
Answer C.
Computer Science & Information Technology
You might also like to view...
If the Repeat Count and Repeat Expression action arguments are left blank, the macro will run ________ time(s)
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ schemes are rules that combine data values in specific formats and locations to generate new data values
Fill in the blank(s) with correct word
Computer Science & Information Technology