a. What is mobile code? b. What is social engineering? c. What is spam? d. What is phishing? e. Distinguish between normal phishing and spear phishing. f. Why are hoaxes bad?
a. How can social engineering be used to get access to a sensitive file? b. What is piggybacking? c. What is shoulder surfing? d. What is pretexting?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here