What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?
A. shoulder-surfing
B. dumpster diving
C. piggybacking
D. desk surfing
Answer: B
Computer Science & Information Technology
You might also like to view...
Define quantization and describe the process.
What will be an ideal response?
Computer Science & Information Technology
Which of the following is NOT a Windows 10 backup and recovery tool?
A) PC Reset B) File History C) Defender D) System image backup
Computer Science & Information Technology
A smaller portion of the population that is easier to evaluate.
What will be an ideal response?
Computer Science & Information Technology
In C# the length of an array cannot be changed. After it is instantiated with a length, dynamic resizing is not an option.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology