Manipulating someone within an organization to gain access to confidential information is called

a. diving.
b. hacking.
c. phreaking.
d. social engineering.
e. trashing.

D

Computer Science & Information Technology

You might also like to view...

Clicking the button, sorts the table in ________order

Fill in the blank(s) with correct word

Computer Science & Information Technology

NetWare 6 was the last version of Novell's network operating system.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology