1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
13

Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known

as:
a. mass marketing
b. social engineering
c. telephone solicitation
d. hacking
Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
3 0
<span>Social engineering is when a person convinces someone to reveal personal information and security system. Those people who use social engineering can trick people through telephone interactions, face-to-face interactions, and email or web interactions. In telephone interaction, they act like a technician but attempts to gather information from the victim. The person who uses face-to-face interactions is when the victim is interrogated to get information. And in email or web interactions, these social social engineering technique will send survey forms that asks personal information such as bank account.</span>
You might be interested in
what is created when the movement of light is blocked by an object and cannot pass through the other side?
larisa86 [58]
A shadow is created.
7 0
3 years ago
Read 2 more answers
PLEASE HELP ASAP!!!!!!!!!!!
Bingel [31]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
When a router forwards incoming packets closer to their destination hosts, this is called?
il63 [147K]
Port forwarding, I think.
3 0
3 years ago
What is the missing term in the code that handles that error??
kykrilka [37]

Answer:

try typing that into gooy gle im sorry if i didnt help

if tickets >400 What is the missing term in the code that handles that error??wat over400error

Explanation:

3 0
3 years ago
You can post a Facebook status update from your smartphone. True or false?
Nady [450]
True .................
3 0
3 years ago
Read 2 more answers
Other questions:
  • Black Ops 3 For Ps4 Players Here
    7·1 answer
  • The parallax perspective says that objects that are close up appear to move __________ than far away objects.
    10·1 answer
  • How do you copy and paste a screenshot on an hd computer
    12·2 answers
  • You are given 6 training examples for a binary classification problem as follows:
    12·1 answer
  • In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.
    12·1 answer
  • Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
    7·1 answer
  • 9. Which is an example of a function?<br>(1 Point)<br>=A1 +A2<br>=SUM(A1:A3)<br>=ADD(A1:A3)​
    14·2 answers
  • I’ll mark brainliest, thanks
    10·2 answers
  • Frank enters "1" in the field for postal code. What is frank most likely trying to do?
    13·2 answers
  • Describe the information technology industry today
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!