Entering a company's restricted area by following closely behind an authorized person is referred to as which of the following?

a. Shoulder surfing
b. Piggybacking
c. False entering
d. Social engineering


Answer: b. Piggybacking

Computer Science & Information Technology

You might also like to view...

Four basic symbols are used to chart data movement on data flow diagrams. They are:

What will be an ideal response?

Computer Science & Information Technology

The Static Text content control adds a field to the form that enables the user to insert unformatted text in the document

Indicate whether the statement is true or false

Computer Science & Information Technology

All of the data for one entity is stored in the same _____.

A. form B. record C. field D. report

Computer Science & Information Technology

Both the echo() and print() statements send data to an input stream.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology