What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
A. Internal virus
B. Inside attack
C. Hacking
D. Social engineering
Answer: D
Computer Science & Information Technology
You might also like to view...
The ________ option allows you to distribute the height of rows equally across the table
A) Even Rows B) Distribute Rows C) Align Rows D) Odd Rows
Computer Science & Information Technology
Which comparison operator means less than or equal to?
a. <= b. >= c. = d. <
Computer Science & Information Technology