A person that secretly peaks at your monitor screen while you work may be doing what?

tailgating

screen capping

shoulder surfing

social engineering


shoulder surfing

Computer Science & Information Technology

You might also like to view...

Which of the following is used to uniquely identify a computer on a network?

A. network ID B. ARP address C. IP address D. Serial number

Computer Science & Information Technology

The file extension for a Rich Text Format file is slx

Indicate whether the statement is true or false

Computer Science & Information Technology

Give a specific reason as to why would you use a named data macro

What will be an ideal response?

Computer Science & Information Technology

Copyright protection lasts 20 years after the date of publication or release.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology