In which type of social engineering attack does the attacker pretend to be someone else?

a. Important user
b. Third-party authorization
c. Masquerading
d. In person

ANS: C

Computer Science & Information Technology

You might also like to view...

Match the names of a variety of features with the type of PowerPoint option:

I. Fade, Wipe, Split II. Ion, Facet, Integral III. Wipe, Fly In, Fade IV. Notes Page, Normal V. Blank, Title Only A. animations B. transitions C. views D. layouts E. themes

Computer Science & Information Technology

Which of the following ports should be allowed to provide access to certain VoIP applications?

A. 110 B. 139 C. 1720 D. 5060

Computer Science & Information Technology