_____ attack is the practice of conning people into revealing sensitive data about a computer system.
Fill in the blank(s) with the appropriate word(s).
Social engineering
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
Social engineering