ISC Exam Questions

Although it is considered a low tech attack ____________ is still a very effective way of gaining un

Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.

A.
Sniffing

B.
Eavesdropping

C.
Social Engineering

D.
Shoulder Surfing

E.
None of the items are correct