Tiffany032390 Tiffany032390 06-09-2016 Computers and Technology contestada describe the process of piggybacking. is this common attack technique possible in your work or school environment?