1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
14

An attacker watches people as they enter a building requiring a key card. he waits until he sees someone who appears to be in a

rush and has their hands full. he then intercepts the person, makes quick small talk, offers to help them hold what's in their hands while he swipes in, and follows behind. this is an example of select one:
a. spear phishing
b. pharming
c. piggybacking
d. man trapping
Social Studies
2 answers:
Natalija [7]3 years ago
7 0

c. piggybacking


:) ++

Lilit [14]3 years ago
5 0

The answer is C. This is an example of piggybacking.

 

 

EXPLANATION

 

Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.

 

To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.  

 

The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.

 

The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

ISIS attacked Paris in 2015: brainly.com/question/11644033  

September 11 attack: brainly.com/question/2910062  

KEYWORD: piggyback attack, attacker, security

Subject: Social Studies

Class: College

Subchapter: Piggyback attack

You might be interested in
Steve is obsessed with avoiding germs, and he feels compelled to bathe several times each day. His therapist suggests that Steve
garri49 [273]

Answer: Learning perspective

Explanation:

The learning perspective which is also referred to as behaviorism.

It deals with how the environment influences or impact our behavior.

According to this perspective , human behaviour is controlled by environmental stimuli that happens before the behavior and outcome of that behavior which comes after.

We learn all the behavior we exhibit through reinforcement or punishment , all these defines whether we continue with the behaviour or not.

Steve's therapist is reinforcing his behavior because he sees that it is itnecessary, since it has temporarily helped to reduce his anxiety in the past , so this behaviour is positive since it can help reduce anxiety.

8 0
3 years ago
A _____ is a figurative description of an opportunity-often brief, measured in days or weeks rather than years-to pass a bill in
Basile [38]
I believe the answer is: <span>policy window 

Most </span><span>policy windows usually are created in order to support major policies that already existed previously.
Examples of a policy windows is the creation of several federal controlled anti terrorism agencies in response to the tragedy on september 11th</span>
3 0
3 years ago
What was the deciding factor in the collapse of Songhai?
Bond [772]

Answer:n 1590, al-Mansur took advantage of the recent civil strife in the empire and sent an army under the command of Judar Pasha to conquer the Songhai and to gain control of the Trans-Saharan trade routes. After the disastrous defeat at the Battle of Tondibi (1591), the Songhai Empire collapsed. So the answer is ABCD

Explanation:

8 0
3 years ago
What is a state called that does not give a single party overwhelming support? A. jumper state B. independent state C. swing sta
Musya8 [376]
It is C. Swing State.
6 0
3 years ago
Read 2 more answers
Helps you stay on track toward your goals. group of answer choices
Law Incorporation [45]

Self-regulation helps you to stay on track toward your goals.

What is Self-regulation?

Self-regulation is the capacity to monitor, control, and modify one's feelings and actions in accordance with the circumstances. Self-regulation is a collection of abilities that includes learned behaviors like emotional intelligence, stress management, impulse control, self-awareness, and successful social skills. These abilities enable people to react to challenging circumstances in ways that are consistent with their values. According to the self-regulation theory (SRT), people may direct and control their own thoughts, feelings, and behaviors in order to accomplish their goals. Self-regulation is a topic of research for psychologists since it sheds light on our motivations.

To know more about Self-regulation refer:

brainly.com/question/2413166

#SPJ4

3 0
1 year ago
Other questions:
  • Here’s some easy points!!
    15·2 answers
  • Who the first president
    9·2 answers
  • One that cannot be copied by the competition?1- evalution2- competitive advantage3- experience curve4- divest
    11·1 answer
  • Matthew sees a nail sticking out from a board which he wishes to push inside. Though there is a brick lying nearby, it does not
    15·1 answer
  • A set of rules are used for performing the verification and validation walkthrough of behavioral model. One of the rules is: all
    9·1 answer
  • What defined you as a citizen in Ancient Greece.
    14·1 answer
  • Humphreys collecting data for the tearoom trade study under the pretense that he was a lookout is an example of a violation of t
    9·1 answer
  • ____________ and ____________ of Jammu and Kashmir and ______________ are in great demand all over the world.
    8·1 answer
  • This amendment to the United States Constitution was established to ensure that all citizens are treated equally under the law.
    10·1 answer
  • What was the significance of the Convention of 1836?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!