?Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

A. ?over-the-shoulder attack
B. ?wardriving attack
C. ?phishing expedition
D. ?Nigerian bank scam


Answer: A

Computer Science & Information Technology

You might also like to view...

Discuss animating bitmap images.

What will be an ideal response?

Computer Science & Information Technology

________ are called smart hubs, because they retransmit signals only to the devices that need to receive them

Fill in the blank(s) with correct word

Computer Science & Information Technology

To change the author name, you click Options on the FILE tab and enter the new author name

Indicate whether the statement is true or false

Computer Science & Information Technology

Which Cisco IOS command is used to display whether CDP is enabled globally and what its current timers are?

A) show cdp summary B) show cdp timers C) show cdp neighbor timers D) show cdp

Computer Science & Information Technology