Jane, a security administrator, forgets his card to access the server room. Jane asks Matt if she could use his card for the day. Which of the following is Jane using to gain access to the server room?

A. Man-in-the-middle
B. Tailgating
C. Impersonation
D. Spoofing


Answer: C. Impersonation

Computer Science & Information Technology

You might also like to view...

Select all that apply. Which of the following are subclasses of the Animation class and the Transition class?

a. StrokeTransition b. TextFillTransition c. ReverseTransition d. ScaleTransition

Computer Science & Information Technology

A SharePoint blog can be used to focus team collaboration on a specific project

Indicate whether the statement is true or false

Computer Science & Information Technology

You do not need to be a ________ to use VBA

A) business professional B) database administrator C) manager D) programmer

Computer Science & Information Technology

Limitations of small and extremely expensive memory are a major concern for the vast majority of programs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology