41) Which of the following is not an example of social engineering?
A) Obtaining and using another person's Social Security Number, credit card, or other confidential information
B) Creating phony Web sites with names and URL addresses very similar to legitimate Web sites in order to obtain confidential information or to distribute malware or viruses
C) Using email to lure victims into revealing passwords or user IDs
D) Setting up a computer in a way that allows the user to use a neighbors unsecured wireless network
42) How can a system be protected from viruses?
43) Describe at least six computer attacks and abuse techniques.