Manipulating someone within an organization to gain access to confidential information is called
a. diving.
b. hacking.
c. phreaking.
d. social engineering.
e. trashing.
D
Computer Science & Information Technology
You might also like to view...
Clicking the button, sorts the table in ________order
Fill in the blank(s) with correct word
Computer Science & Information Technology
NetWare 6 was the last version of Novell's network operating system.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology