Jane, a security administrator, forgets his card to access the server room. Jane asks Matt if she could use his card for the day. Which of the following is Jane using to gain access to the server room?
A. Man-in-the-middle
B. Tailgating
C. Impersonation
D. Spoofing
Answer: C. Impersonation
Computer Science & Information Technology
You might also like to view...
Select all that apply. Which of the following are subclasses of the Animation class and the Transition class?
a. StrokeTransition b. TextFillTransition c. ReverseTransition d. ScaleTransition
Computer Science & Information Technology
A SharePoint blog can be used to focus team collaboration on a specific project
Indicate whether the statement is true or false
Computer Science & Information Technology
You do not need to be a ________ to use VBA
A) business professional B) database administrator C) manager D) programmer
Computer Science & Information Technology
Limitations of small and extremely expensive memory are a major concern for the vast majority of programs.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology