Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?

a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data

Answer D. Social Engineering is basically using people skills to gather information

Computer Science & Information Technology

You might also like to view...

Each ________ in a bitmap image contains information about the color to be displayed on a monitor

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Project 2013's ________ view, the critical path is represented by red task boxes and red link lines

A) Gantt Chart B) Resource Sheet C) Network Diagram D) Calendar

Computer Science & Information Technology