Programmable locks and combination locks are vulnerable to shoulder surfing

Indicate whether the statement is true or false.

ANS: True

Computer Science & Information Technology

You might also like to view...

Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A) Often only billing information is available, which does not prove identity B) The hacker may use more than one ISP C) ISPs almost never release the necessary information D) All of the above

Computer Science & Information Technology

The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.

A. WPA B. RSN C. TKIP D. WAE

Computer Science & Information Technology