Multiple Choice
Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
A) Shoulder surfing
B) Man-in-the-middle
C) Tailgating
D) Impersonation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q225: An administrator is investigating intermittent, slow performance
Q226: A user is working on a shared
Q227: A user's phone contains customer's PII. The
Q228: A user notices recent print jobs are
Q229: A technician is setting up a kiosk.
Q231: Which of the following key and mouse
Q232: A technician is creating a network topology
Q233: A user browses to a company's intranet
Q234: Joe, a customer, calls a technician to
Q235: Ann, a user, is attempting to log