Multiple Choice
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?
A) Phishing
B) Social engineering
C) Password theft
D) Virus infections
E) Physical threats
Correct Answer:

Verified
Correct Answer:
Verified
Q49: _ are scrambled character images used to
Q50: Many U.S. technology firms believe that U.S.
Q51: One of the reasons one should be
Q52: Hackers might infiltrate computer systems to enlist
Q53: _ are highly restrictive programs that permit
Q55: Computer systems are often infected with malware
Q56: Web sites of reputed companies can also
Q57: Worms require an executable (a running program)
Q58: Multiple administrators jointly controlling key systems are
Q59: Challenge questions offered by Web sites to