Before conducting a security test by using social-engineering tactics, what should you do?

a. Set up an appointment.
b. Document all findings.
c. Get written permission from the person who hired you to conduct the security test.
d. Get written permission from the department head.

Ans: c. Get written permission from the person who hired you to conduct the security test.

Computer Science & Information Technology

You might also like to view...

In Windows 10, devices with touch capability include ________ recognition

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the term with the correct description below.

A. Contains all the components of a form. B. Select from a list or enter a new item. C. Use to insert a SmartArt graphic into a form. D. Provides users with a list of restricted choices. E. A placeholder that contains the data associated with a label.

Computer Science & Information Technology