The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.
A. packet monkeys
B. intellectual property
C. shoulder surfing
D. script kiddies
Answer: C
Computer Science & Information Technology
You might also like to view...
The item marked 4 in the accompanying figure is the ____.
A. Property inspector B. Stage C. Timeline D. pasteboard
Computer Science & Information Technology
A circle that enables you to adjust the height or width of a selected chart.
What will be an ideal response?
Computer Science & Information Technology
Which of the following is not considered one of the five most common business impacts?
a. Financial b. Productivity c. Reputation d. Social e. Safety
Computer Science & Information Technology
CSS stands for _____________________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology