1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
9

________________ involves tricking other people into breaking security procedures and sharing sensitive information.

Computers and Technology
2 answers:
mina [271]3 years ago
6 0

Answer:

The correct word for the blank space is: Social engineering.

Explanation:

Social engineering is the practice of obtaining sensitive information through manipulating legitimate users. Those pieces of information could be <em>Social Security Numbers (SSN), bank accounts, credit card numbers </em>or <em>PINs</em>. The information is gathered by installing malware into the servers' computers. Typically, social engineering leads to fraud cases.

Nuetrik [128]3 years ago
5 0

Answer:

The right answer is social engineering.

Explanation:

social engineering has different meanings in terms of computer security and social studies.

In computer security, social engineering can be defined as the practice to manipulate some people so that they give their personal credentials with the attacker. Their first moto is to gather the information of that user by fraud.

It can be the credential of banking, system access etc.

Hence, the most appropriate answer is social engineering.

You might be interested in
What is the minimum recommended point size for presentation text?<br> 12<br> 24<br> 36<br> 48
Darya [45]
The answer would be 24
6 0
3 years ago
Where do you go to view and access important info about your document all in one location
kumpel [21]
The place you go to view and access important info about your document would be in the menu bar.
6 0
3 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
What does amelia heart and the wright brothers have in common
expeople1 [14]

Answer:

they are stepbro and step sis and they fucx

Explanation:

7 0
3 years ago
Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
blondinia [14]

Answer:

1) Nate open his template first and clicks the tab on the ribbon

2) Then, he clicks the dialog box that appears

3) He chooses Templates from the menu

4) Clicks Go to clicks the Organizer button

5) Then he clicks copy

6) Next he clicks on the left side to the backstage view

7) Finally, he selects the document that includes the style he wants to transfer to the normal template

Explanation:

I hope this helps

5 0
3 years ago
Other questions:
  • Write a program named TypingGrades that allows a user to enter a student’s number of words typed. The output is the letter grade
    9·1 answer
  • In the ADT graph, the method addEdge has efficiency
    6·1 answer
  • The medium format camera uses ___ film
    7·1 answer
  • The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class
    9·1 answer
  • In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
    15·1 answer
  • it has been said that television has little real educational value. what is your opinion on this issue?
    11·1 answer
  • 6-1) (Math: pentagonal numbers) A pentagonal number is defined as n(3n–1)/2 for n = 1, 2, . . ., and so on. Therefore, the first
    10·1 answer
  • Source Code for TF2 - Please insert it here
    14·1 answer
  • Please help!!!!!!! 50 POINTS!!!!
    10·1 answer
  • What is science worksheet answers name the three features that make science different from other human endeavors?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!