CERTIVIEW

Wednesday, 3 August 2016

CEH v9 Question of the Week: Social Engineering Attack

CEH-v9-QOWBlueKevin, an IT security consultant, is working on contract for Davidson Avionics to audit the company’s network. He is given permission to perform any necessary tests. Kevin creates a fake company ID badge and uniform and waits by one of the company’s entrance doors. He follows an employee into the office after they use their valid access card to gain entrance.

What type of social engineering attack has Kevin employed?

A. Piggybacking.
B. Eavesdropping.
C. Tailgating.
D. Reverse social engineering.

Reveal Answer

The correct answer is C.

Tailgating implies access to enter into the building or secured area without the consent of the authorized person. It is the act of following an authorized person through a secure entrance, as when a polite user opens and then holds the door for those following. An attacker wears a fake badge and attempts to enter a secured area by closely following an authorized person through a door requiring key access.

 

Related Course
Certified Ethical Hacker v9

CEH v9 Question of the Week Series

  • CEH v9 Question of the Week: Retina Scanners
  • CEH v9 Question of the Week: Employee Behavior
  • CEH v9 Question of the Week: CVE-2007-2447
  • CEH v9 Question of the Week: SQL Injection
  • CEH v9 Question of the Week: Web Application Penetration Testing
  • CEH v9 Question of the Week: iptables
  • CEH v9 Question of the Week: Examine Streams of Packets
  • CEH v9 Question of the Week: Scans
  • CEH v9 Question of the Week: SQL Injection
  • CEH v9 Question of the Week: Standard Risk Assessment
  • CEH v9 Question of the Week: Penetration Testing
  • CEH v9 Question of the Week: SMB Over TCP/IP
  • CEH v9 Question of the Week: Block Cipher
  • CEH v9 Question of the Week: Prevent Future DoS Attacks
  • CEH v9 Question of the Week: Same MAC Address
  • CEH v9 Question of the Week: XSS Scripting
  • CEH v9 Question of the Week: Sniff a Switched Network
  • CEH v9 Question of the Week: TCP/IP Session Hijacking
  • CEH v9 Question of the Week: Firewall Traffic
  • CEH v9 Question of the Week: Full TCP connection
  • CEH v9 Question of the Week: Password Cracking Tool
  • CEH v9 Question of the Week: Social Engineering Attack


from
CERTIVIEW
Unknown at 03:25
Share

No comments:

Post a Comment

‹
›
Home
View web version

About Me

Unknown
View my complete profile
Powered by Blogger.