1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
4 years ago
9

Is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking

to people in the organization?
Computers and Technology
1 answer:
aleksandr82 [10.1K]4 years ago
4 0
The answer would be software exploitation
You might be interested in
The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
erma4kov [3.2K]

Answer: MD5

Explanation:

 The Cisco IOS modifying the dead internal automatically when the message digest 5 (MD5) internal are changed in the system. When we enabled the MD5 authentication in the Cisco by using the keyword "Message digest" then we configuring the password in the IP OSPF interface command which is known as MD5 key.

The OSPF interface is a compatible configuration in the remote interface before they considered as neighbors in the Cisco system. The MD5 are basically created by the cisco NX-OS.

5 0
4 years ago
Which of the following is the best definition of a workplace policy?
Arte-miy333 [17]

The answer is D, the standard course of action adopted by a business.

4 0
3 years ago
Analyzing Uses for PDFs
Sauron [17]

Answer:

You need to send a file to someone who does not have Word

Explanation:

In this case the answer is You need to send a file to someone who does not have Word.

But we use PDF to send files without changing its format.

4 0
3 years ago
Among the many DTP software tools available today, which is regarded as the industry standard for DTP?
nexus9112 [7]

Answer:

bland1 InDesign    Blank2 typesetting

Explanation:

4 0
3 years ago
Read 2 more answers
Does a soda vending machine Give reciepts?<br><br>need for computer science hw
kupik [55]
No, they do not give receipts.<span />
6 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss three ways you could (or currently do) use the Excel software in your personal or professional life. Provide examples an
    12·1 answer
  • 4.2: Roman Numeral Converter
    9·1 answer
  • You are tasked with creating a mileage calculator to calculate the amount of money that should be paid to employees. The mileage
    5·1 answer
  • The bubble sort algorithm sorts using what technique?
    14·1 answer
  • Demographics refers to
    7·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • Budgeting for a Computer
    6·1 answer
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!