__
involves building an inappropriate trust relationship with employees
for the purpose of gaining sensitive information or unauthorized access
privileges.
A.Hacking
B.Reverse social engineering
C.Social engineering
D.Spoofing
A.Hacking
B.Reverse social engineering
C.Social engineering
D.Spoofing
No comments:
Post a Comment
Note: only a member of this blog may post a comment.