Multiple Choice
Manipulating someone within an organization to gain access to confidential information is called
A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: The manipulation of a person inside an
Q10: A _is a computer, positioned between a
Q11: An intentional action designed to prevent legitimate
Q12: A software program that responds to commands
Q13: A file accompanying an email message is
Q14: The_ criminalizes a wide variety of hacker-related
Q15: A _is a piece of self-replicating code
Q17: The Conficker worm is notable because<br>A) it
Q18: A piece of self-replicating code embedded within
Q19: Anonymous is<br>A) an activist group that promotes