Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What technique do intruders use to gain unauthorized access to the system by contacting users and collecting information from them?
Social engineering
Rootkits
Trojan horse
Key logging
Social engineering is a process in which an attacker gathers information from users by contacting them in number of ways and once enough information is collected, then attacker gains an unauthorized access. Key logging is used to track activity on a host. Rootkits are used to hide evidence of compromise. Trojan horse is a file or application that has malware hidden inside of it.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.