An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?
A.
Data mining
B.
Social engineering
C.
Intrusion detection
D.
Hacking
An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?
An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?
A.
Data mining
B.
Social engineering
C.
Intrusion detection
D.
Hacking