Which of the following is a way to gain access to a protected system while another user is entering credentials?

A. Spim
B. Shoulder surfing
C. DDoS
D. Backdoor


Answer: B. Shoulder surfing

Computer Science & Information Technology

You might also like to view...

For the linked list implementation, if the stack is not empty, which of the following accesses the top element in a member function?

a. element b. topOfStack c. topOfStack.element d. topOfStack->element e. none of the above

Computer Science & Information Technology

In vim, you modify text by using the keyboard instead of the mouse.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To make a specific database active, you must execute the ____ database statement.

A. CHANGE B. USE C. SWITCH D. SELECT

Computer Science & Information Technology

In the Performance tab of Task Manager, what field displays the amount of memory currently required by the OS kernel and drivers that can be written to virtual memory?

A. Committed B. Cached C. Paged pool D. Non-paged pool

Computer Science & Information Technology