An employee from the fire Marshall's office arrives to inspect the data center. The operator allows him to bypass the multi-factor authentication to enter the data center. Which of the following types of attacks may be underway?

A. Impersonation
B. Hoax
C. Tailgating
D. Spoofing


Answer: C. Tailgating

Computer Science & Information Technology

You might also like to view...

An array called aList contains integers 5, 3, 7, 2, 8. What are the contents of aList after the function call workOnArray (aList, 4), if and the definition of workOnArray is:

int workOnArray (int a[], int n) { if (n == 1) return a[0] + 3; else { a[n] = workOnArray (a, n-1); return 7; } } a) 5, 3, 8, 8, 8 b) 5, 6, 10, 5, 11 c) 5, 3, 8, 7, 7 d) 8, 6, 10, 5, 11

Computer Science & Information Technology

The following session shows the commands needed to perform the task. The tar archive is in the ~/labs.tar file.

What will be an ideal response?

Computer Science & Information Technology

In VBA a macro is called a ________

A) process B) function C) procedure D) subroutine

Computer Science & Information Technology

Microsoft ________ is most appropriate to use to create a memo for business use

A) Word B) Excel C) Access D) PowerPoint

Computer Science & Information Technology