Multiple Choice
____ relies on tricking and deceiving someone to access a system.
A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: Match each item with an statement below:
Q12: _ targets only specific users.<br>A) Google pharming<br>B)
Q13: Briefly describe the main characteristics of a
Q14: What are the main characteristics of WLAN
Q15: What are some of the techniques used
Q17: What are the two fundamental characteristics of
Q18: The informal expression used more often for
Q19: A(n) _ PC is small enough to
Q20: NetStumbler can capture and decode wireless packets,
Q21: _ involves phishers setting up their own