• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which social engineering physical attack statement is correct?

  • In the tailgating attack, an unauthorized person tags along with an authorized person to gain entry to a restricted area with the person’s consent.
  • In the piggybacking attack, an unauthorized person tags along with an authorized person to gain entry to a restricted area without the person’s consent.
  • Badge cloning attacks cannot be performed by software.
  • Shoulder surfing can be prevented by using special screen filters for computer displays.

Explanation & Hint:

There are various types of physical attacks. With piggybacking, unauthorized person tags along with an authorized person to gain entry to a restricted area, usually with the person’s consent. Tailgating is the same but usually occurs without the authorized consent of the person. In badge cloning attacks, specialized software and hardware can perform such attacks. With shoulder surfing, someone obtains information such as personally identifiable information, passwords, and other confidential data by looking over the shoulder of the victim. There are special screen filters for computer displays to prevent someone from seeing the screen at an angle.

For more Questions and Answers:

4.6.3 Quiz – Social Engineering Attacks Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments