in Education by
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice. (a) a good (b) not so good (c) very good social engineering practice (d) a bad I had been asked this question during an interview for a job. The query is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right choice is (d) a bad Easiest explanation: Overlooking or peeping into someone’s system when he/she is entering his/her password is a bad practice and is against the ethics of conduct for every individual. Shoulder surfing is a social engineering attack approach used by some cyber-criminals to know your password and gain access to your system later.

Related questions

0 votes
    After performing ____________ the ethical hacker should never disclose client information to other parties. (a) hacking (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    ____________ is the information gathering phase in ethical hacking from the target user. (a) Reconnaissance (b) Scanning ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    ____________ or smishing is one of the simplest types of phishing where the target victims may get a fake ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
0 votes
    DNS trojans are used for performing a type of DNS hijacking. (a) True (b) False The question was asked ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    How many basic processes or steps are there in ethical hacking? (a) 4 (b) 5 (c) 6 (d) 7 This question ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ________ phase in ethical hacking is known as the pre-attack phase. (a) Reconnaissance (b) Scanning (c) Gaining ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following comes after scanning phase in ethical hacking? (a) Scanning (b) Maintaining access (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    __________ is the last phase of ethical hacking process. (a) Scanning (b) Tracks clearing (c) Reconnaissance (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...