answersLogoWhite

0

accessing someone email or personal details

Cyber stalking

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

What are the types of exploitation used to attack the network?

forensics and technical


What are the two types of exploitation a used to attack the network?

not tactical and forensics


What are the two types exploitation used to attack the network?

forensics and technical


What are two types of exploitation used to attack the network?

forensics and technical


What are the two types of exploitation used to attack a terrorist network?

not tactical and forensics


What are the two types of exploitation used to attack?

forensics and technical


What types of network accessories are compatible with a computer?

There are many types of network accessories that are compatible with a computer. For example: network cards, external hubs, USB link cables and network testers.


Which types of network connections use a network card in the computer for the physical connection?

An Ethernet (RJ45) connection can be found on a network card.


How many types of addresses does a network node have?

In computer networking, a node refers to a connection point. It has two types of addresses, a network address and a physical address.


What is computer networking explain the types of computer?

Computer networking can be defined as a process of establishing communication between a no. of autonomous computers in order to allow exchange of resources through the network. There are two main types of networking: 1) Peer to peer network : In this network all network resources are evenly shared , between all the users. All users in the network have equal administrative privileges. 2) Server client network: This is a network where there is only 1 central point in a network that supplies the network resources, this point has administrator privileges in the network and controls the whole network.


Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and?

What you are describing is not necessarily a network attack as it can be applied to all types of situations, not just network-based. It is known as "social engineering" and is a very low-tech approach to compromise a system or network.


Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?

What you are describing is not necessarily a network attack as it can be applied to all types of situations, not just network-based. It is known as "social engineering" and is a very low-tech approach to compromise a system or network.