Unbeknownst to you, a coworker was able to watch you type your login credentials while you were sitting at your desk. Later that same coworker used those credentials to access resources that they didn’t have access to. This is an example of what type of social engineering attach?
Shoulder surfing
Tailgating
Piggybacking
Phishing
Network Security | |
Network Implementations | |
Network Operations | |
Network Troubleshooting | |
Networking Fundamentals |