While Sara is logging into the server from her workstation, she notices Pete watching her enter the username and password. Which of the following social engineering attacks is Pete executing?

A. Impersonation
B. Tailgating
C. Piggybacking
D. Shoulder surfing


Answer: D. Shoulder surfing

Computer Science & Information Technology

You might also like to view...

Display the course number, number of sections and total capacity for courses having more than 3 sections.( 9 rows).

What will be an ideal response?

Computer Science & Information Technology

The left pane of Slide Master view displays the slide masters and ________

A) slide templates associated with the slide master B) slide themes associated with the slide master C) slide properties associated with the slide master D) slide layouts associated with the slide master

Computer Science & Information Technology

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

A. network B. switch C. broadband D. node

Computer Science & Information Technology

An example of a company stakeholder includes all of the following EXCEPT:

A. employees B. the general public C. stockholders D. management

Computer Science & Information Technology