Question and answer
5. Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as:
Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as: SOCIAL ENGINEERING.
g
cecillereign|Points 674|
Question
Asked 7/5/2016 7:07:57 AM
Updated 7/5/2016 8:01:26 AM
0 Answers/Comments
This answer has been confirmed as correct and helpful.
Confirmed by jeifunk [7/5/2016 8:01:26 AM]
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
TRUE OR FALSE: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code.
Weegy: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code. TRUE. (More)
Question
Updated 35 days ago|8/20/2020 8:00:20 AM
0 Answers/Comments
7. TRUE OR FALSE: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance.
Weegy: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance. TRUE. (More)
Question
Updated 7/5/2016 8:00:35 AM
0 Answers/Comments
9. Vulnerability can be defined as:
Weegy: Vulnerability can be defined as an erroneous belief, cognitive bias, or pattern of thought that is believed to predispose the individual to psychological problems. (More)
Question
Updated 7/5/2016 7:59:42 AM
0 Answers/Comments
8. The potential for an unwanted outcome resulting from an incident, event, or occurrence is
Weegy: The potential for an unwanted outcome resulting from an incident, event, or occurrence is Risk. (More)
Question
Updated 7/5/2016 8:00:02 AM
0 Answers/Comments
11. Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as:
Weegy: Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as Malicious code. [ ] (More)
Question
Updated 7/5/2016 7:58:04 AM
0 Answers/Comments
32,255,442
questions answered
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
L
P
L
P
P
Points 1354 [Total 9454] Ratings 0 Comments 1354 Invitations 0 Offline
S
L
P
R
P
R
L
P
P
C
R
P
R
L
P
R
P
R
Points 1353 [Total 15108] Ratings 7 Comments 1263 Invitations 2 Offline
S
L
Points 1212 [Total 1581] Ratings 0 Comments 1212 Invitations 0 Offline
S
L
P
1
L
Points 1106 [Total 5389] Ratings 10 Comments 1006 Invitations 0 Offline
S
L
P
P
P
1
P
L
Points 617 [Total 8068] Ratings 15 Comments 467 Invitations 0 Online
S
L
L
1
Points 586 [Total 6502] Ratings 6 Comments 526 Invitations 0 Online
S
L
Points 451 [Total 482] Ratings 0 Comments 1 Invitations 45 Offline
S
L
1
Points 286 [Total 4290] Ratings 9 Comments 196 Invitations 0 Offline
S
L
Points 282 [Total 2816] Ratings 3 Comments 252 Invitations 0 Offline
S
L
Points 229 [Total 314] Ratings 1 Comments 219 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.