Which of the following is a way to gain access to a protected system while another user is entering credentials?
A. Spim
B. Shoulder surfing
C. DDoS
D. Backdoor
Answer: B. Shoulder surfing
You might also like to view...
For the linked list implementation, if the stack is not empty, which of the following accesses the top element in a member function?
a. element b. topOfStack c. topOfStack.element d. topOfStack->element e. none of the above
In vim, you modify text by using the keyboard instead of the mouse.
Answer the following statement true (T) or false (F)
To make a specific database active, you must execute the ____ database statement.
A. CHANGE B. USE C. SWITCH D. SELECT
In the Performance tab of Task Manager, what field displays the amount of memory currently required by the OS kernel and drivers that can be written to virtual memory?
A. Committed B. Cached C. Paged pool D. Non-paged pool