Multiple Choice
A con artist telephones an employee,pretends to be from his own organization's IT unit,and says he must have the employee's password to fix a problem.This is an example of ___________.
A) social pathology
B) data encryption
C) social engineering
D) data mining
Correct Answer:

Verified
Correct Answer:
Verified
Q38: What is a Trojan horse?
Q39: A_ represents another server for all information
Q40: _are measures taken to ensure that only
Q41: When tapping communications,law enforcement agencies need the
Q42: _provide backup and operation facilities to which
Q44: To aid in business recovery,copies of applications
Q45: When both the sender and recipient use
Q46: In recent years,identity theft has been more
Q47: The greater the number of interdependent systems,the
Q48: _,the time during which ISs or data