In which type of social engineering attack does the attacker pretend to be someone else?
a. Important user
b. Third-party authorization
c. Masquerading
d. In person
ANS: C
Computer Science & Information Technology
You might also like to view...
Match the names of a variety of features with the type of PowerPoint option:
I. Fade, Wipe, Split II. Ion, Facet, Integral III. Wipe, Fly In, Fade IV. Notes Page, Normal V. Blank, Title Only A. animations B. transitions C. views D. layouts E. themes
Computer Science & Information Technology
Which of the following ports should be allowed to provide access to certain VoIP applications?
A. 110 B. 139 C. 1720 D. 5060
Computer Science & Information Technology