Unbeknownst to you, a coworker was able to watch you type your login credentials while you were sitting at your desk. Later that same coworker used those credentials to access resources that they didn’t have access to. This is an example of what type of social engineering attach?

  • Shoulder surfing

  • Phishing

  • Piggybacking

  • Tailgating


Your Score:
Networking Fundamentals
Network Implementations
Network Operations
Network Security
Network Troubleshooting
CompTIA Network+ N10-008
  • Networking Fundamentals
  • Network Implementations
  • Network Operations
  • Network Security
    • This question is filed here
  • Network Troubleshooting