Answer:
Social Engineering
Explanation:
Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
For me the some steps I use not 10 steps sorry are I always go through the slide and think what I am talking about. You have to understand what you are talking about and be clear and persuasive. Never look at the presentation. Memorize key phrases and keep your eyes at your audience. make each of your slides colorful so viewers will look at your actually slide.
B. The charge would leak off and the pith balls would hang straight down.