In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

Fill in the blank(s) with the appropriate word(s).

social engineering

Computer Science & Information Technology

You might also like to view...

A bit field must be declared as a:

a. int or unsigned. b. char. c. float. d. long.

Computer Science & Information Technology

A(n) ____ is a device that forwards data on a network.

A. server B. advancer C. mirror D. router

Computer Science & Information Technology