header bg

Question:

To obtain user passwords, which of the following techniques is used by malicious employees?

A Shoulder surfing
Explaination