1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
14

An attacker watches people as they enter a building requiring a key card. he waits until he sees someone who appears to be in a

rush and has their hands full. he then intercepts the person, makes quick small talk, offers to help them hold what's in their hands while he swipes in, and follows behind. this is an example of select one:
a. spear phishing
b. pharming
c. piggybacking
d. man trapping
Social Studies
2 answers:
Natalija [7]3 years ago
7 0

c. piggybacking


:) ++

Lilit [14]3 years ago
5 0

The answer is C. This is an example of piggybacking.

 

 

EXPLANATION

 

Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.

 

To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.  

 

The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.

 

The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

ISIS attacked Paris in 2015: brainly.com/question/11644033  

September 11 attack: brainly.com/question/2910062  

KEYWORD: piggyback attack, attacker, security

Subject: Social Studies

Class: College

Subchapter: Piggyback attack

You might be interested in
Write five stics of present society?​
blagie [28]

Explanation:

Hunting-Gathering societies.

Horticultural societies.

Agrarian societies.

Industrial societies.

Post-industrial societies.

3 0
2 years ago
Describe the role of the president as a countries chief diplomat?
Alisiya [41]

As head of state of the U.S. Government meaning the president is the highest ranking member of government he or she represents the United States as the chief diplomat in interactions with other countries. Also given his constitutional powers he or she is also the commander in chief meaning they are in charge of the military with fits with their overall position as head of the executive branch of the U.S. Government. 

6 0
3 years ago
Which statement correctly identifies the most important duty of a citizen
nasty-shy [4]

In my opinion it’s B, as it is very important to stay safe in the country no matter what.

8 0
3 years ago
Fiscal policy helps the government manage the economy by:
alexandr402 [8]

Answer:

Spending tax money during difficult economic times.

Explanation:

This was my answer on A.P.E.X

3 0
2 years ago
Read 2 more answers
A person who tends to be selfish, demanding and disregards the rights of other people would appear to have a stronger ______ tha
Elden [556K]
A person who tends to be selfish, demanding and disregards the rights of other people would appear to have a stronger id than superego.
8 0
2 years ago
Other questions:
  • Greece's economy prospered thanks to?
    10·2 answers
  • How long did the gold rush last? name one of its impacts
    8·1 answer
  • What is generally the first stage of a social problem?
    8·1 answer
  • Most state constitutions
    15·1 answer
  • The order of the letters along the rows of computer keyboards could be changed to allow users to type faster, but this would inc
    11·1 answer
  • Can someone help me with these 2 questions? And tell me why it is the correct answer?
    11·1 answer
  • 1. How did World War I contribute to the events leading up to World War II?
    15·1 answer
  • A PI team role responsible for maintaining the records of a team's work during meeting, including any documentation required by
    12·1 answer
  • President Andrew Jackson replaced a number of government workers with his
    5·1 answer
  • - How else did the British use the countryside apart from colleting Revenue?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!