Which of the following, also known as social engineering, is a methodology by which an individual impersonates someone else to extract sensitive information from them?

A) Pretexting
B) System infiltration
C) Corporate identity theft
D) Denial of service

A) Pretexting

Computer Science & Information Technology

You might also like to view...

When adding text to a SmartArt graphic, you can either type directly in the SmartArt graphic or type in a(n) ____

a. Access table b. Word table c. Text Pane d. SmartArt dialog box

Computer Science & Information Technology

List two reasons for taking an object-oriented approach to systems development.

What will be an ideal response?

Computer Science & Information Technology