Exam Premium CompTIA

CompTIA exam questions

☰
  • CompTIA A+ Core 1
  • CompTIA A+ Core 2
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+
  • Home
  • Blog
  • Man-in-the-Middle exploits

CompTIA A+ Core 2 Question F-46

Which of the following security threats does NOT use software to extract sensitive information or credentials?

A. Grayware
B. Shoulder surfing
C. Malware
D. Man-in-the-Middle exploits

Correct Answer: B

Explanation:
http://searchsecurity.techtarget.com/definition/shoulder-surfing

Tagged with 
Man-in-the-Middle exploits Shoulder surfing
 
Affiliated Sites
  • PMP Exam Questions
  • Cisco CCNA Exam Questions
  • CompTIA A+ Core 1
  • CompTIA A+ Core 2
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+
Copyright © 2026 Exam Premium CompTIA
×Close