Many social engineers begin gathering the information they need by using which of the following?

a. The Internet
b. The telephone
c. A company intranet
d. E-mail

Ans: b. The telephone

Computer Science & Information Technology

You might also like to view...

Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What section of the administrator console should you configure if you want to limit the number of hosts shown to those that meet a particular criterion?

A. Management views B. Host groups C. Actions pane D. Filters

Computer Science & Information Technology