Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?

  • Worm transmission
  • Grayware installation
  • Human interaction
  • Malware installation

CompTIA A+ 220-802
  • Operating Systems
  • Security
    • This question is filed here
  • Mobile Devices
  • Troubleshooting