Following someone through a secure door for access without using an authorized ID card or pass code is called ________. (Choose the most specific answer.)

A) door hacking
B) social engineering
C) piggybacking
D) shoulder surfing


Answer: C

Business

You might also like to view...

When referring to channel and medium, medium is the system used to deliver the message

Indicate whether the statement is true or false.

Business

Availability of a system refers to the ______.

A. percentage of the time that a system is operating properly when it is needed for use B. percentage of the time that a system is down for maintenance C. percentage of components in the system that have a backup component D. percentage of the time that a system is available for use by the department that owns it (and is not being used by other departments)

Business

What was the engine that drove the Wine Library's explosive growth?

A) a coast-to-coast mass advertising campaign B) a personal, door-to-door sales campaign C) the firm's enthusiastic approach to using social media D) the company's innovative investor relations program E) an aggressive couponing and point-of-sale effort in liquor stores

Business

Which of the following primarily deal with indirect goods?

A) e-distributors and industry consortia B) e-distributors and e-procurement Net marketplaces C) exchanges and industry consortia D) exchanges and e-procurement Net marketplaces

Business