Solved

Which of the Following Social Engineering Vulnerabilities Occurs When Someone

Question 230

Multiple Choice

Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?


A) Shoulder surfing
B) Man-in-the-middle
C) Tailgating
D) Impersonation

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions