An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

A. Data mining
B. Social engineering
C. Intrusion detection
D. Hacking

Answer: B. Social engineering

Computer Science & Information Technology

You might also like to view...

When a user makes changes to a record in a form, the record is also updated in the underlying ________

A) report B) grid C) table D) query

Computer Science & Information Technology

____________ ("P" or "p") causes the number to be multiplied by 100 and displayed with a trailing space and % sign.

a. Percent format b. Currency format c. Exponential format d. Number format

Computer Science & Information Technology