In a scenario where an attacker pretends to be a maintenance worker to gain physical access to a secured area, which social engineering technique are they employing?
- Baiting
- Impersonation
- Piggybacking
- Tailgating
The attacker is employing the "Tailgating" social engineering technique. This involves following an authorized person into a secure area without their knowledge or consent, often by pretending to be an employee or someone with a legitimate reason to enter the area.
Loading...
Related Quiz
- What type of assessment is primarily focused on ensuring that a company is adhering to its stated security policies and controls?
- What is the primary purpose of a digital signature in electronic documents?
- Regularly updating and patching network devices is a key _______ in network security.
- A financial institution wants to ensure that even if their data is intercepted during transmission, the intruder wouldn't be able to understand it. They decide to transform this data into a code to prevent unauthorized access. What process are they using?
- An organization has detected an ongoing cyber attack. They've isolated the affected systems and are now focused on removing the threat and securing the systems to prevent the same attack in the future. Which phase of incident response are they currently in?