What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

A. Internal virus
B. Inside attack
C. Hacking
D. Social engineering

Answer: D

Computer Science & Information Technology

You might also like to view...

The ________ option allows you to distribute the height of rows equally across the table

A) Even Rows B) Distribute Rows C) Align Rows D) Odd Rows

Computer Science & Information Technology

Which comparison operator means less than or equal to?

a. <= b. >= c. = d. <

Computer Science & Information Technology