1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
4 years ago
7

Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

Computers and Technology
1 answer:
sergiy2304 [10]4 years ago
6 0

Answer: Over-the-shoulder attack

Explanation:

 According to the given question, Over-the-shoulder attack is one of the type of attack in which the attacker gain the login information, coincidental data and the password by using the physical proximity.

  • Over the shoulder occur due to the stealing of password in the public area.
  • In this type of over the shoulder attack , the attacker can steal the PIN, code, password so that they can breaking all the security system for stealing the personal data or some information.

Therefore, Over-the-shoulder attack is the correct answer.

You might be interested in
Who began digitizing books on a massive scale and putting them online?
Sholpan [36]

The answer is Google Cooperation.

Google began the mass digitization of bound volumes of books and as a result, it is getting widespread media attention. Google has had, and is still keeping up with its intention to digitize all the books across major USA libraries. Its intention is not to provide a reading environment, but rather create an online index to books in libraries and bookstores.

4 0
3 years ago
The file extension of MS-Word document in office 2007 is?(a) .pdf (b) .doc (c) .docx (d) .txt
serious [3.7K]
It is usually .doc but if you use notepad, (the free version of Word) it's .docx
5 0
3 years ago
Read 2 more answers
Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
AVprozaik [17]
Why visit it?
For entertainment, purely for the user to enjoy the content that has been produced for them.

Why was it made?
Netflix is a subscription based service that has been made to allow users to stream TV shows and other entertainment sources. It was made for leisure.
7 0
3 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
4 years ago
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
4 years ago
Other questions:
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • What is the formula for calculating the average of cells<br> C2 through C30?
    15·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • Finding information on the Web is easy thanks to _____________, which provide on-screen menus, making navigation of the web as s
    11·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • When would the Jerusalem virus attack?<br> 1. Friday the 13th<br> 2. Wednesday the 13th
    13·2 answers
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
  • Yaaaaaa.........
    7·2 answers
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!