Exploiting staff members to gain access to restricted files or systems is known as:
A.
Malware
B.
Social engineering
C.
Access control
D.
Spyware
Exploiting staff members to gain access to restricted files or systems is known as:
Exploiting staff members to gain access to restricted files or systems is known as:
A.
Malware
B.
Social engineering
C.
Access control
D.
Spyware