______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.