In the context of security, _____ is an attack that takes advantage of the human element of security systems.
Question 7 options:
disk mirroring
weblogging
voice recognition
social engineering
1 answer
social engineering
Question 7 options:
disk mirroring
weblogging
voice recognition
social engineering
1 answer