Multiple Choice
What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?
A) Shoulder surfing
B) Footprinting
C) Piggybacking
D) Dumpster diving
Correct Answer:

Verified
Correct Answer:
Verified
Q1: What utility can be used to intercept
Q2: Namedroppers is a tool that can be
Q3: Which HTTP method requests that the entity
Q4: What is the HTTP method that retrieves
Q5: Explain the process of "footprinting," and why
Q7: What type of information is usually gathered
Q8: Which process utilizes the knowledge of human
Q9: Match each item with a statement below.<br>-Server
Q10: Which HTTP method is used with a
Q11: What is the passive process of finding