subject

Craig likes to work on his computer at his local coffee shop, but people around him may be able to see what he is doing, including entering passwords for his accounts. This method of gaining confidential information is referred to as .

(A) phishing
(B) shoulder surfing
(C) man-in-the-middle attacks
(D) spear phishing

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 15:00, billlyyyyyyyyyy
Visually impaired individuals generally rely on the for navigation. thus, designers need to ensure that mouse-specific inputs, such as pointing, clicking, and hovering, can be done without a mouse.
Answers: 1
image
Computers and Technology, 24.06.2019 13:20, sanaiajohnson56
In the insert table dialog box, you select the checkbox to create the first row as the header of the table.
Answers: 3
image
Computers and Technology, 24.06.2019 14:00, ameliaxbowen7
Which computer tools allow you to communicate with coworkers, family, and friends
Answers: 1
image
Computers and Technology, 24.06.2019 17:30, leenzazou98241
What is the next step if your volume does not work on computer
Answers: 2
You know the right answer?
Craig likes to work on his computer at his local coffee shop, but people around him may be able to s...

Questions in other subjects:

Konu
English, 25.08.2019 08:50