Answer:
The correct answer is 1. Social engineering
Explanation:
In computer security, social engineering refers to a technique where someone with a malicious intent tricks or manipulates people else to give up confidential information or perform an action that goes against their best interest.
In our case, this can be seen as a very clear case of social engineering. This is because the situation is extremely suspicious: it's extremely rare, for a software company to call a specific customers to alert them of bugs and offer assistance in order to "fix" said bug. The "tech" expert could mislead an unsuspecting user into revealing some confidential information or installing backdoor software disguised as part of the bug fixing process. This situation is not unlike pop-up ads that appear on some websites, alerting the user that a virus or a security flaw has been detected, and prompting the user to click a dodgy link that actually leads to a malicious website or downloads some equally malicious software.
Answer: B
Explanation: checks and balances is when one branch can CHECK the actions of another branch this allows for there to be no abuse or misuse of power amongst any branches BALANCES.
I believe the answer is: Senior Rater
The assessment that they make to rate the soldier would be based on various factors such as academic standard, ability to follow instructions, personal accomplishment, etc. The scores would be used as a basis to determine who would obtain future promotions
CERTAIN RULING POWER OVER TERRITORY
Answer:
Two-Thirds
Explanation:
The Constitution provides that an amendment may be proposed either by the Congress with a two-thirds majority vote in both the House of Representatives and the Senate or by a constitutional convention called for by two-thirds of the State legislatures.