What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?
A) Shoulder surfing
B) Footprinting
C) Piggybacking
D) Dumpster diving
Correct Answer:
Verified
Q29: When an attacker chooses to combine social
Q30: What is "competitive intelligence"?
Q31: Match each item with a statement below.
-Request
Q32: List at least five tools available for
Q33: What social engineering tactic can be utilized
Q35: Which process utilizes the knowledge of human
Q36: Explain the process of "footprinting," and why
Q37: Which of the following is a text
Q38: What type of general commands allow a
Q39: Which type of social engineering attack attempts
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents