1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
14

An attacker watches people as they enter a building requiring a key card. he waits until he sees someone who appears to be in a

rush and has their hands full. he then intercepts the person, makes quick small talk, offers to help them hold what's in their hands while he swipes in, and follows behind. this is an example of select one:
a. spear phishing
b. pharming
c. piggybacking
d. man trapping
Social Studies
2 answers:
Natalija [7]3 years ago
7 0

c. piggybacking


:) ++

Lilit [14]3 years ago
5 0

The answer is C. This is an example of piggybacking.

 

 

EXPLANATION

 

Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.

 

To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.  

 

The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.

 

The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

ISIS attacked Paris in 2015: brainly.com/question/11644033  

September 11 attack: brainly.com/question/2910062  

KEYWORD: piggyback attack, attacker, security

Subject: Social Studies

Class: College

Subchapter: Piggyback attack

You might be interested in
Which service is provided by local governments? A) waste disposal B) highway patrol C) national guard D) state health plan
stepan [7]
The service provided by local government is", state health plan
5 0
3 years ago
Harley-davidson markets motorcycles, clothes, toys, and restaurants. it uses its strong ________, which is ________.
Savatey [412]

As Harley-davidson markets motorcycles, clothes, toys, and restaurants, it uses its strong <u>brand image</u> which is an intangible resource.

<h3>What is an intangible resource?</h3>

In essence, an Intangible resources refers to those the resources a business owns that are not physical but still provide real value. An example of intangible assets is the intellectual property held by a business, such as songs, designs, trademarks, software licenses, motion pictures, customer lists, franchises etc

These resources can be extremely valuable to the company and in some cases have more value than all of the company’s tangible assets.

A brand image is also an Intangible asset and it means the perception of the brand in the mind of the customer; it is also an aggregate of beliefs, ideas and impressions that a customer holds regarding the brand.

Therefore, as Harley-davidson markets motorcycles, clothes, toys, and restaurants, it uses its strong <u>brand image</u> which is an intangible resource.

Read more about intangible resource

brainly.com/question/14988168

#SPJ1

7 0
2 years ago
Needed asap plz!!!!
Fofino [41]
Gross domestic product
5 0
3 years ago
Read 2 more answers
What region of Europe can Italy and Germany be found?
AVprozaik [17]

Answer:

Eastern Europe

Eastern Europe is everything east of Germany, Austria, and Italy. These regional labels are used more for identification than for regional analysis

8 0
3 years ago
HERES ONE MORE! DUE IN 5 MINUTES!!! YOU HAVE TO TELL ME THE SPECIFIC NUMBER NOT JUST 1 2 AND 3 LIKE 17 AND THE ACTUAL NUMBER THA
Karo-lina-s [1.5K]

Answer:

Explanation:

# 17 is Theodore Roosevelt

# 9 is A

6 0
3 years ago
Read 2 more answers
Other questions:
  • If you administer a physical correction for a particular unwanted behavior and it has no effect on the dog whatsoever, what shou
    5·1 answer
  • What are the necessary development for province 5 nepal​
    10·1 answer
  • Which of the following is true of development?
    7·1 answer
  • Law and the legal system are based on ideas from centuries past, but both are still constantly evolving to meet the needs of tod
    8·1 answer
  • Refer to prom night scenario. the butler was efficient, tactful, and mannerly, exactly the way sara and her friends had always i
    8·1 answer
  • In what thomas pettigrew called the ultimate attribution error, people make the mistake of attributing negative behavior they as
    10·1 answer
  • A co-worker has sent an email to Mahan asking him if he will take her on-call shift next Friday so she can go to a concert. Maha
    7·1 answer
  • One view of ___________ crime is that it is a group of ethnically diverse groups who received profit through the sale of illegal
    8·1 answer
  • 30 points!
    7·1 answer
  • A settler in the 1800s would have been most likely to start a new town in which area?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!