Which security threat would be lessened by implementing a mantrap?
A) Shoulder surfing
B) Social engineering
C) Tailgating
D) Phishing
C
Computer Science & Information Technology
You might also like to view...
The ReadLine method requires you to provide the file's name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In a URL, the domain name is followed by the machine name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What can a ‘database trigger’ be used for? Explain concisely what the code below does.
What will be an ideal response?
Computer Science & Information Technology
When creating a blog, you should create a(n) _______ where you describe yourself, listing any relevant information.
A. About page B. Home page C. Tagged page D. Post page
Computer Science & Information Technology