What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A. Shoulder surfing
B. Footprinting
C. Piggybacking
D. Dumpster diving


Answer: C

Computer Science & Information Technology

You might also like to view...

When wrapping text in a cell, row height increases and decreases automatically

Indicate whether the statement is true or false

Computer Science & Information Technology

Consider a database schema with four relations: Supplier, Product, Customer, and Contracts. Both the Supplier and the Customer relations have the attributes Id, Name, and Address. An Id is a nine-digit number. Product has PartNumber (an integer between 1 and 999999) and Name. Each tuple in the Contracts relation corresponds to a contract between a supplier and a customer for a speci?c product in a certain quantity for a given price.

a. Use SQL DDL to specify the schema of these relations, including the appropriate integrity constraints (primary, candidate, and foreign key) and SQL domains. b. Specify the following constraint as an SQL assertion: there must be more contracts than suppliers.

Computer Science & Information Technology

With a presentation distributed on CD or as a PDF, hyperlinks give the audience an opportunity to interact with the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

The linear gradient has a(n) ____ handle to change the gradient's width.

A. circular B. square C. triangular D. arrow

Computer Science & Information Technology