3. As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementign advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type? a. Social enginerring b. IDS system c. Perimeter security d. Biometrics
A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environmnet.