An unauthorized user observing system security procedures is known as:
A.
a worm.
B.
shoulder surfing.
C.
phishing.
D.
spyware.
Explanation:
http://www.lifelock.com/education/id-theft-types/shoulder-surfing/
An unauthorized user observing system security procedures is known as:
An unauthorized user observing system security procedures is known as:
A.
a worm.
B.
shoulder surfing.
C.
phishing.
D.
spyware.
Explanation:
http://www.lifelock.com/education/id-theft-types/shoulder-surfing/