Exam Premium

CompTIA exam questions

☰
  • CompTIA A+ 220-1101
  • CompTIA A+ 220-1102
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+

CompTIA A+ Core 2 Question F-46


Which of the following security threats does NOT use software to extract sensitive information or credentials?

A. Grayware
B. Shoulder surfing
C. Malware
D. Man-in-the-Middle exploits

Correct Answer: B

Explanation:
http://searchsecurity.techtarget.com/definition/shoulder-surfing

Tagged with 
Man-in-the-Middle exploits Shoulder surfing
 

Post navigation

Previous Post« Previous CompTIA A+ Core 2 Question F-45
Next Post CompTIA A+ Core 2 Question F-47Next »
Affiliated Sites
  • PMP Exam Questions
  • Cisco CCNA Exam Questions
  • CompTIA A+ 220-1101
  • CompTIA A+ 220-1102
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+
Copyright © 2025 Exam Premium
×Close