1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
6

Explain the difference between social engineering and reverse social engineering.

Computers and Technology
1 answer:
san4es73 [151]3 years ago
5 0
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.

Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
You might be interested in
After stating your thesis, follow up by demonstrating the importance of the topic, and explain why the audience or future audien
bearhunter [10]

Answer: audience relevance

Explanation:

Most importantly when stating a thesis we should show and present how the work in the thesis is relevant to the audience. In this way we would be able to connect our research work more to the people and the audience. We should be able to state how our work is going to benefit them, what the people should do in this regard and all the dos and don't must be mentioned clearly while stating our thesis.

4 0
3 years ago
You can use the___<br> to copy data from Excel to Access.
kap26 [50]

Answer:

You can use the Import spreadsheet wizard program.

Explanation:

On the Office ribbon, select the External Data tab and click Excel. The "Get External Data - Excel Spreadsheet" wizard appears. In the File name field, browse to the Excel file. Select the "Import the source data into a new table in the current database" option and click OK.

8 0
2 years ago
Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image wi
Ivan

Answer:

enables you to make changes to one part of an image without accidentally changing other parts

Explanation:

Computer aided designs incorporate the use of multiple layers in drawings. The first layer is known as the layer 0, while the present layer the designer is working on is known as the current layer. The advantage of the incorporation of layers in designs include the following

1. It helps objects to be altered, grouped, hidden and moved as the designer wishes.

2. Layers can be grouped and worked on separated and common properties like color and line weight assigned to them.

3. Layers can be manipulated as the user wishes. They can be locked, frozen, turned off, etc.  Locking prevents accidental changes being made on objects.

4 0
3 years ago
to _________________________ is a mouse operation in which you move the mouse until the pointer on the desktop is positioned on
Radda [10]
Drag... you drag the mouse across the screen.
6 0
3 years ago
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the s
GrogVix [38]
Console Port Method

Connecting a computer to a Cisco device through the console port requires a special console cable.
8 0
3 years ago
Other questions:
  • Why is important to build strong connections
    9·2 answers
  • How has science fiction influenced technology
    7·2 answers
  • The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
    9·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • How to get out of compatibility mode in word?
    15·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Describe two different examples of potential conflicts, and explain why these conflicts can have a negative impact on
    14·1 answer
  • 4. What is the difference between head tag and heading tag?​
    13·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!