Multiple Choice
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
A) Trespass.
B) Social engineering.
C) Identity theft.
D) Information extortion.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Backup and recovery procedures are recommended only
Q2: Making and distributing information goods to which
Q3: Which of the following can be classified
Q4: Implementing controls to prevent threats from occurring
Q5: Whereas phishing attacks are _ , denial
Q6: An information system's _ is the likelihood
Q7: _ can be used to create strong
Q8: Computer programs like CAPTCHA are used to
Q10: Buying health insurance is an example of
Q11: Access controls consist of _, which confirms