COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe, Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her department. Which of the following forms of social engineering would BEST describe this situation?
|
Impersonation
|
|
Dumpster diving
|
|
Tailgating
|
|
Shoulder Surfing
|
Explanation:
There is 1 question to complete.