Answer:
C. Social Engineering
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.
Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.
Answer:
account recovery
Explanation:
account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.
There are a few consequences for failing to identify system requirements.
1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).
2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.
3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume)
https://www.google.com/url?sa=t&source=web&rct=j&url=https://support.office.com/en-us/article/video-create-a-network-diagram-a2360cd9-5c9d-4839-b4f6-17b485e02262&ved=2ahUKEwjlr4bdjd7hAhUiyYUKHR1UC1EQwqsBMAB6BAgLEAU&usg=AOvVaw3ZFpgzww1z4gFaeRCROkF-