1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
14

An attacker watches people as they enter a building requiring a key card. he waits until he sees someone who appears to be in a

rush and has their hands full. he then intercepts the person, makes quick small talk, offers to help them hold what's in their hands while he swipes in, and follows behind. this is an example of select one:
a. spear phishing
b. pharming
c. piggybacking
d. man trapping
Social Studies
2 answers:
Natalija [7]3 years ago
7 0

c. piggybacking


:) ++

Lilit [14]3 years ago
5 0

The answer is C. This is an example of piggybacking.

 

 

EXPLANATION

 

Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.

 

To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.  

 

The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.

 

The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

ISIS attacked Paris in 2015: brainly.com/question/11644033  

September 11 attack: brainly.com/question/2910062  

KEYWORD: piggyback attack, attacker, security

Subject: Social Studies

Class: College

Subchapter: Piggyback attack

You might be interested in
What is the legal provision for punishment in case of cyber crime?​
Zolol [24]

Answer:

Up to 20 years in prison and/or an 1,000,000 dollar fine.

6 0
1 year ago
Which one is it? HMMM look at the pic to see the question
NNADVOKAT [17]

Answer:

B. mixture 2

Explanation:

I believe it would be B. because it is the only mixture where nothing would dissolve into the water, and both of the other components would also not combine. Hope this helped, good luck!

Dragon

5 0
2 years ago
As agriculture replaced hunting and gathering, _______ began to develop.
yaroslaw [1]
C- civilizations
as people began to realize they could grow their own food instead of hunting or looking for food
6 0
3 years ago
Read 2 more answers
According to edward t. hall, in which spatial zone do most people converse with friends and family members? a. social b. persona
Snowcat [4.5K]
B///////////////////////////////////////////////////////////////////////////
7 0
3 years ago
Read 2 more answers
Example of how GBV has displayed itself in our community​
babymother [125]

Answer:

Around the world 35% women suffer from sexual abuse, domestic violence's, human trafficking because of their partner. ... Men are more violent with women than women are more violence with men. Men are less educated who did violence with women.

5 0
3 years ago
Other questions:
  • Which groups tended to favor tariffs?
    10·1 answer
  • Boris has occasionally felt a sensation of being detached from his surroundings. He tells the social worker that he feels as if
    8·1 answer
  • What are the principles and ideals that shape a dictatorship.
    10·2 answers
  • Which principle was established in the school-sponsored prayer case of Engel v Vitale
    8·1 answer
  • If a biological child of tall parents has dwarfism, and one of the child’s ancestors had dwarfism, which type of gene might have
    7·2 answers
  • 1. What is "Brown Blood" disease in fish <br> 2. What is the cause of brown blood disease
    7·2 answers
  • Hey help me yarr plzz​
    7·1 answer
  • 4. What did Mahatma Gandhi do during his stay in South Africa?​
    11·1 answer
  • From 1800 to 1824 presidential candidates were chosen by
    10·1 answer
  • All of the following are sources of stress except________. group of answer choices pressure frustration uncontrollability aggres
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!