________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.

A. Trailing
B. Shadowing
C. Piggybacking
D. Shoulder surfing


C. Piggybacking

Computer Science & Information Technology

You might also like to view...

Explain the advantages of incremental system development from the viewpoint of

a. The managers of the enterprise sponsoring the project b. The project manager c. The implementation team

Computer Science & Information Technology

Applying many formatting options to a picture can be distracting

Indicate whether the statement is true or false

Computer Science & Information Technology

The four areas for organizing fields in a PivotTable are ROWS, COLUMNS, ________ and VALUES

Fill in the blank(s) with correct word

Computer Science & Information Technology

Microsoft PowerPoint is a(n) ____________________ graphics program that you can use to create slide show presentations.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology