Sarah, a new employee, is having trouble accessing a secure office. A friendly co-worker she hasn't met offers to let her in using his access card. This scenario is an example of which social engineering technique?
- Tailgating
- Phishing
- Spear Phishing
- Vishing
This scenario is an example of "Tailgating." Tailgating involves an unauthorized person following an authorized person into a secured area. In this case, Sarah's friendly co-worker is exploiting her trust to gain access to the secure office.
Loading...
Related Quiz
- What is the primary purpose of a strong password policy in user authentication?
- An organization implements a new software solution and within a week receives a message on their server stating that their data has been encrypted and will only be released upon payment. Which type of cybersecurity threat is this scenario depicting?
- A company's IT department receives a report of an email sent to several employees that appears to be from the CEO, asking them to click on a link and enter their credentials. The CEO denies sending such an email. This situation is most likely an example of which type of attack?
- In the context of wireless networks, what does WPA stand for?
- In file system security, what restricts or allows specific actions (like reading, writing, executing) on a file or a directory?