Which of the following BEST describes this practice?

An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

An outside user is attempting to access company secured files by collecting information during a phone conversation. Which of the following BEST describes this practice?

A.
Data mining

B.
Social engineering

C.
Intrusion detection

D.
Hacking



Leave a Reply 0

Your email address will not be published. Required fields are marked *