alayanaanlynepinth alayanaanlynepinth
  • 12-01-2017
  • Social Studies
contestada

A type of attack where the intruder observes authentication secrets such as a combination or pin:

Respuesta :

Аноним Аноним
  • 12-01-2017
shoulder to get personal information
Answer Link
jkoyocku jkoyocku
  • 21-02-2020

Answer:

Shoulder surfing is the correct answer.

Explanation:

Talking about computer security, the term shoulder surfing refers to a form of social engineering technique that is used to obtain information (like the one mentioned in the question: personal identification numbers, passwords, etcetera) by looking over the victim's shoulder.

Answer Link

Otras preguntas

What is the value of h in the diagram below? If necessary, round your answer to the nearest tenth of a unit PLS HELP ASAP
Johan found that the equation –2|8 – x| – 6 = –12 had two possible solutions: x = 5 and x = –11. Which explains whether his solutions are correct? He is correct
which is a dependent clause?​
The Perimeter of rectangle DEFG is 120, ED=X, and FE=4x. What is the value of x?
what is one way a parent can help a child cope with stress​
The order of operations is not important to solving math problems. True or False
whats the french word for bread?
Factor the polynomial. 3x^4 +6x^3 + 9x^2
The year in each of the Works Cited entries MOST LIKELY refers to A) the year the writer of the paper read the source. B) the year the author of the source wa
The cost of performance tickets and beverages for a family of four can be modeled using the equation 4x + 12 = 48, where x represents the cost of a ticket. How