1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
2 years ago
14

An attacker watches people as they enter a building requiring a key card. he waits until he sees someone who appears to be in a

rush and has their hands full. he then intercepts the person, makes quick small talk, offers to help them hold what's in their hands while he swipes in, and follows behind. this is an example of select one:
a. spear phishing
b. pharming
c. piggybacking
d. man trapping
Social Studies
2 answers:
Natalija [7]2 years ago
7 0

c. piggybacking


:) ++

Lilit [14]2 years ago
5 0

The answer is C. This is an example of piggybacking.

 

 

EXPLANATION

 

Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.

 

To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.  

 

The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.

 

The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

ISIS attacked Paris in 2015: brainly.com/question/11644033  

September 11 attack: brainly.com/question/2910062  

KEYWORD: piggyback attack, attacker, security

Subject: Social Studies

Class: College

Subchapter: Piggyback attack

You might be interested in
Why Social Studies is important?
Arlecino [84]
It teaches about the history of things and that might be useful for a job
5 0
3 years ago
Read 2 more answers
What makes Sara Chickering different from the rest of the characters? Your answer?
Arlecino [84]

Explanation:

3000 3500 How the I can have it the next same time days work as usual and with you and on your way to work

this

this

T

is a

To

D

the

Y

best

Ya

D

D is

a great

fit for

Hlo

hi

Tu

D

fhir

is

is a

I

great product

have

I a great

product

Hlo

I

am

very good

I

I

am not

like it

a

was

I

was

a

D

D

I

D

and

I

I

like the

one

and

and

I

I

like the

3 0
3 years ago
When a person who is placed on probation commits a new crime, this is generally known as a probation ________?
ddd [48]
Probation violation takes place when a person commits a crime again when he/she is on probation already. However, when the violation was first time committed, the probation could be revoked in which the accused will serve the remaining time in jail, as decided by the court. 
8 0
3 years ago
Reasonable suspicion gives police the right to ____ individuals
Semenov [28]
The correct answer is "search". Without reasonable suspicion, a police officer must have a warrant to search a person's property. If the police officer sees something notably suspicious, he has the right to search the property without a warrant.
8 0
3 years ago
What is the chemical formula for the molecule shown
Reika [66]

Answer:

NH3

Explanation:

Ammonia is a chemical compound formed by the chemical combination of Nitrogen and Hydrogen atoms. One Nitrogen and three hydrogen atoms are joined together by a covalent bond to form the ammonia compound.

4 0
3 years ago
Other questions:
  • What cultural differences or similarities were found in the research on pedestrian interaction in the u.s. and japan?
    9·1 answer
  • ______are often faced with the need to learn things on their own.
    7·2 answers
  • Which shows a major change from early settlements to complex societies? The trade or barter system disappeared under the growth
    12·2 answers
  • According to the Federal Trade Commission, "someone appropriating your personal information without your knowledge to commit fra
    8·1 answer
  • Which organization best completes the diagram showing the structure of the
    10·1 answer
  • "Gottfredson and Hirschi's ________ holds that lack of self-control is the common factor underlying problem behaviors."
    13·1 answer
  • List three historical issues that have been used to debate the different interpretations of the Constitution. Then choose one of
    10·1 answer
  • A hurdler trips over a hurdle, falls on her hands, and stands up screaming and holding her forearm. The lower third of her forea
    5·1 answer
  • According to the theory of stereotype threat, situational pressures can lead to decreased performance on tests of cognitive abil
    12·1 answer
  • Carotid endarterectomy and prevention of cerebral ischemia in symptomatic carotid stenosis. Veterans Affairs Cooperative Studies
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!