?Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
A. ?over-the-shoulder attack
B. ?wardriving attack
C. ?phishing expedition
D. ?Nigerian bank scam
Answer: A
Computer Science & Information Technology
You might also like to view...
Discuss animating bitmap images.
What will be an ideal response?
Computer Science & Information Technology
________ are called smart hubs, because they retransmit signals only to the devices that need to receive them
Fill in the blank(s) with correct word
Computer Science & Information Technology
To change the author name, you click Options on the FILE tab and enter the new author name
Indicate whether the statement is true or false
Computer Science & Information Technology
Which Cisco IOS command is used to display whether CDP is enabled globally and what its current timers are?
A) show cdp summary B) show cdp timers C) show cdp neighbor timers D) show cdp
Computer Science & Information Technology