adplus-dvertising
frame-decoration

Question

What is the term for watching over a target's shoulder to obtain valuable information?

a.

Interrogation

b.

Shoulder surfing

c.

Elicitation

d.

USB drop attacks

Answer: (b).Shoulder surfing Explanation:Shoulder surfing is the term for watching over a target's shoulder to obtain valuable information, such as passwords or access codes. This technique involves visually observing the target's actions.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is the term for watching over a target's shoulder to obtain valuable information?

Similar Questions

Discover Related MCQs

Q. In the context of penetration testing, under what circumstances might bribery be considered a valid technique?

Q. What is vishing in the context of phishing attacks?

Q. What is whaling in the context of phishing attacks?

Q. What is the main aim of phishing attempts?

Q. What is a watering hole attack in the context of web-based social engineering?

Q. What is the purpose of combining social engineering techniques with technical tools in penetration testing?

Q. Which tool is a menu-driven social engineering attack system that provides spear phishing, website, infectious media, and other attack vectors?

Q. What is SET (Social Engineering Toolkit) integrated with to generate payloads?

Q. Which penetration testing tool is designed to allow exploitation of web browsers?

Q. What information does BeEF provide about the connected browser?

Q. What does BeEF allow penetration testers to do inside a hooked browser?

Q. What is the purpose of caller ID and VoIP call spoofing tools in penetration testing?

Q. What advantage does physical access provide in penetration testing that isn't available in remote network-based assessments?

Q. What is one technique for gaining physical access to facilities in penetration testing?

Q. What is social engineering in the context of penetration testing?

Q. What are some common motivating factors relied upon in social engineering?

Q. What do toolkits like the Social Engineering Toolkit (SET) and the Browser Exploitation Framework (BeEF) leverage in penetration testing?

Q. What do vishing, smishing, whaling, and spear phishing have in common?

Q. Cynthia wants to use a phishing attack to acquire credentials belonging to the senior leadership of her target. What type of phishing attack should she use?

Q. Mike wants to enter an organization’s high-security data center. Which of the following techniques is most likely to stop his tailgating attempt?