1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
5

A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking

normal security procedures is called
Computers and Technology
1 answer:
lana66690 [7]3 years ago
4 0
Social Engineering.

---------------------------
You might be interested in
Which function in spreadsheet software can be used to predict future sales or inventory needs?
melisa1 [442]
create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.
6 0
2 years ago
Read 2 more answers
Which of the following is the output of the code
olya-2409 [2.1K]

Answer:

need to see code

3 0
3 years ago
What is token passing?
Flauer [41]

Answer:

Answer is A network access method that avoids the possibility of data collisions.

Token Ring is the precursor to Ethernet and CSMA/CD to avoid packet collisions.

Explanation:

8 0
3 years ago
The VP of sales at universal containers requested that "Verbal Agreement" be added as a new opportunity stage. The Administrator
Ahat [919]

Answer:

D. Add the new value to the appropriate sales process.

Explanation:

7 0
3 years ago
When the hyper-v role is added to a windows server 2012 r2 server, what is loaded first during boot?
Naya [18.7K]
The <span>Hypervisor is loaded first.</span>
6 0
3 years ago
Other questions:
  • What is a stereo type?
    14·2 answers
  • Write a code segment that takes an emailaddress stored in the string email and stores theuser name in the string user and the ho
    13·1 answer
  • What is the purpose of copyfitting?
    12·1 answer
  • Mary is writing an article about the software development life cycle. She wants to place a flowchart besides the text. Which men
    6·2 answers
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • PLEASE HURRY!!!
    11·1 answer
  • What is the purpose of using specialized supply chain software?
    7·1 answer
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • Computer science is a blank process
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!