Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?
a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data
Answer D. Social Engineering is basically using people skills to gather information
Computer Science & Information Technology
You might also like to view...
Each ________ in a bitmap image contains information about the color to be displayed on a monitor
Fill in the blank(s) with correct word
Computer Science & Information Technology
In Project 2013's ________ view, the critical path is represented by red task boxes and red link lines
A) Gantt Chart B) Resource Sheet C) Network Diagram D) Calendar
Computer Science & Information Technology