Short Answer
When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Social engineers attempt to exploit the natural
Q2: _ is the simple tactic of following
Q4: _ is when an attacker attempts to
Q5: Social engineers attempt to convince authorized individuals
Q6: _ is when an e-mail trying to
Q7: Which of the following is NOT an
Q8: A good security practice is to choose
Q9: What is a good first step for
Q10: Leaving sensitive information in a car is
Q11: An attacker posts a flier offering services