Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?

  • Malware installation
  • Human interaction
  • Grayware installation
  • Worm transmission

CompTIA A+ 220-1002
  • Operating Systems
  • Security
    • This question is filed here
  • Software Troubleshooting
  • Operational Procedures