Entering a company's restricted area by following closely behind an authorized person is referred to as which of the following?
a. Shoulder surfing
b. Piggybacking
c. False entering
d. Social engineering
Answer: b. Piggybacking
Computer Science & Information Technology
You might also like to view...
Four basic symbols are used to chart data movement on data flow diagrams. They are:
What will be an ideal response?
Computer Science & Information Technology
The Static Text content control adds a field to the form that enables the user to insert unformatted text in the document
Indicate whether the statement is true or false
Computer Science & Information Technology
All of the data for one entity is stored in the same _____.
A. form B. record C. field D. report
Computer Science & Information Technology
Both the echo() and print() statements send data to an input stream.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology