Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking