Which of the following techniques is used by malicious employees to obtain user passwords?
A) Main-in-the-middle
B) Phishing
C) Tailgating
D) Shoulder surfing
Correct Answer:
Verified
Q250: Which of the following technologies can be
Q251: A project team is organized to implement
Q252: A technician logs on to a Linux
Q253: A client wants a technician to create
Q254: A customer purchased a 3TB HDD to
Q256: Which of the following built-in accounts was
Q257: Ann, a user, has purchased a new
Q258: A technician is troubleshooting a printer issue
Q259: A network administrator has noticed unusual activity
Q260: A user who is running Windows 10
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents