An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?
A. Data mining
B. Social engineering
C. Intrusion detection
D. Hacking
Answer: B. Social engineering
Computer Science & Information Technology
You might also like to view...
When a user makes changes to a record in a form, the record is also updated in the underlying ________
A) report B) grid C) table D) query
Computer Science & Information Technology
____________ ("P" or "p") causes the number to be multiplied by 100 and displayed with a trailing space and % sign.
a. Percent format b. Currency format c. Exponential format d. Number format
Computer Science & Information Technology