1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
4 years ago
7

Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

Computers and Technology
1 answer:
sergiy2304 [10]4 years ago
6 0

Answer: Over-the-shoulder attack

Explanation:

 According to the given question, Over-the-shoulder attack is one of the type of attack in which the attacker gain the login information, coincidental data and the password by using the physical proximity.

  • Over the shoulder occur due to the stealing of password in the public area.
  • In this type of over the shoulder attack , the attacker can steal the PIN, code, password so that they can breaking all the security system for stealing the personal data or some information.

Therefore, Over-the-shoulder attack is the correct answer.

You might be interested in
Answer for a, b, and c
Darya [45]

The answer is a. im pretty positive but if im wrong super sorry

5 0
3 years ago
What traits make an effective leaader
Airida [17]
Being able to be a strong leader 

a great thinker 
great sportsmanship
great at judging fairly 
a great person overall

4 0
3 years ago
Read 2 more answers
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
Editing is the process of cutting out the bad parts. True or false?
Maurinko [17]

Answer:

true

Explanation:

your welcome

7 0
3 years ago
Read 2 more answers
Derek has an interest in designing video games. What requirements should he fulfill to be a game designer? To be a game designer
4vir4ik [10]

Answer:

2. Marketing, communication or advertising

Explanation:

5 0
3 years ago
Other questions:
  • A cracked tone (reluctor) ring will often cause what type of problem
    13·1 answer
  • I am confused in Java!
    12·1 answer
  • What options does the business user have to manually share individual records? A new custom object is being created with a priva
    10·1 answer
  • Combinations of spaces and special characters can be used in domain names of uniform resource locators (urls).
    6·2 answers
  • ITS MAKING ME TYPE URL CODES NOW!
    6·1 answer
  • Tim is creating a page to display his poker club’s set of rules. He has main categories and subcategories along with about a par
    12·1 answer
  • Who wants brainliest? First to answer gets it....
    12·2 answers
  • Directions Interview your parent or any member of your family. Identity
    12·1 answer
  • Write a for loop to print all the even numbers from 200 to 300.
    14·1 answer
  • What are the five generations of computer software​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!