1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
6

Explain the difference between social engineering and reverse social engineering.

Computers and Technology
1 answer:
san4es73 [151]3 years ago
5 0
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.

Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
You might be interested in
Find a quote that you like. Store the quote in a variable, with an appropriate introduction such as "Ken Thompson once said, 'On
pishuonlain [190]

Answer:

The program to this question as follows:

Program:

quote="You can always edit a bad page. You can’t edit a blank page."

name="Jodi Picoult"

print("Quote:\n",quote)

print ('\t\t\t\t\t\t\t',"Author name-", name)

Output:

Quote:

You can always edit a bad page. You can’t edit a blank page.

       Author name- Jodi Picoult

Explanation:

In the above python code, two variable "quote and name" is defined, in which variable both variable holds some string value.

  • In the next line, the print function is defined, that first print "Quote" as a message, and for line breaking "\n" is used, then print quote variable value.
  • In the last step, first, we use "\t" for line spacing then message "Author name-", and then name variable value.
7 0
3 years ago
What is typeface
Mademuasel [1]
I’m so bored and hungry answer is c 3566
4 0
3 years ago
Read 2 more answers
Best gaming chairs under 150 (facts)​
adelina 88 [10]

Answer:

IKEA ÖRFJÄLL/SPORREN Swivel Chair, White, Vissle Light Green 191.623.75

Explanation:

it's Ikea

7 0
3 years ago
Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tes
Zielflug [23.3K]

Answer:

1. Time management

2. troubleshooting

Explanation:

In Software development job, Tester is responsible for Quality of development and deployment. The responsibilities of Tester are following:

  1. Analyze feasibility and validity of software.
  2. Execute all level of testing
  3. Detect and track inconsistencies and defects in software
  4. Provision of solution in timely manners
  5. Provide support and documentation

<u>Definitions</u>

<u />

<u>Time Management</u>

A process of managing and controlling the time to spend on specific activities. Good time management skills help to provide solution in shorter period of time.

<u>Troubleshooting</u>

A form of problem solving by tracing faults in logical and correct manners is called Troubleshooting.

<em>So, This is the reason why I choose, time management and trouble shooting for Tester Job. Because He/She should be able to fix the problem in short period of time.</em>

8 0
3 years ago
A tool that is used to search for and gather data from a page on the Internet is called a _____ Query.
Lyrx [107]

Answer:

search query

Explanation:

5 0
3 years ago
Other questions:
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • The Twitter website has become a de facto first source for many important events in the last decade. Twitter's hashtag feature l
    15·2 answers
  • Which of the following can you do under the fair use exceptions?
    6·1 answer
  • Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
    11·1 answer
  • I keep getting this error: postfix.cpp: In function ‘double RPN_evaluation(std::string)’: postfix.cpp:42:26: error: cannot conve
    7·1 answer
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • What is the difference between websites and web page​
    8·1 answer
  • If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
    8·1 answer
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
  • 16
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!