While Sara is logging into the server from her workstation, she notices Pete watching her enter the username and password. Which of the following social engineering attacks is Pete executing?
A. Impersonation
B. Tailgating
C. Piggybacking
D. Shoulder surfing
Answer: D. Shoulder surfing
You might also like to view...
Display the course number, number of sections and total capacity for courses having more than 3 sections.( 9 rows).
What will be an ideal response?
The left pane of Slide Master view displays the slide masters and ________
A) slide templates associated with the slide master B) slide themes associated with the slide master C) slide properties associated with the slide master D) slide layouts associated with the slide master
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
A. network B. switch C. broadband D. node
An example of a company stakeholder includes all of the following EXCEPT:
A. employees B. the general public C. stockholders D. management