Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
A.
Sniffing
B.
Eavesdropping
C.
Social Engineering
D.
Shoulder Surfing
E.
None of the items are correct
Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
A.
Sniffing
B.
Eavesdropping
C.
Social Engineering
D.
Shoulder Surfing
E.
None of the items are correct