Which of the following is a low-tech way of gaining unauthorized access to systems?
A . Social Engineering
B . Eavesdropping
C . Scanning
D . Sniffing
Answer: A
Which of the following is a low-tech way of gaining unauthorized access to systems?
A . Social Engineering
B . Eavesdropping
C . Scanning
D . Sniffing
Answer: A