Which of the following, also known as social engineering, is a methodology by which an individual impersonates someone else to extract sensitive information from them?
A) Pretexting
B) System infiltration
C) Corporate identity theft
D) Denial of service
A) Pretexting
Computer Science & Information Technology
You might also like to view...
When adding text to a SmartArt graphic, you can either type directly in the SmartArt graphic or type in a(n) ____
a. Access table b. Word table c. Text Pane d. SmartArt dialog box
Computer Science & Information Technology
List two reasons for taking an object-oriented approach to systems development.
What will be an ideal response?
Computer Science & Information Technology