Question
a.
Piggybacking
b.
Tailgating
c.
Lock picking
d.
Social engineering
Posted under CompTIA PenTest+ Certification Exam PT0 002
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What technique involves accompanying a legitimate employee to gain unauthorized access to a facility?
Similar Questions
Discover Related MCQs
Q. What is a potential advantage of dressing as a delivery driver during a physical penetration test?
View solution
Q. What is one way penetration testers can bypass locks that don't use keys?
View solution
Q. What organization provides a guide to U.S. lockpicking laws by state?
View solution
Q. What is a concern in social engineering exercises related to badge cloning?
View solution
Q. What are "shove keys" used for in lock bypass techniques?
View solution
Q. How can egress or exit sensors be exploited by penetration testers?
View solution
Q. What should penetration testers focus on when dealing with higher-security fence designs?
View solution
Q. What security control may need to be bypassed or disabled during a physical penetration test?
View solution
Q. What technique involves recording an entire physical penetration test attempt using a concealed camera?
View solution
Q. What is the goal of a dumpster diving expedition during a physical penetration test?
View solution
Q. What is the primary focus of social engineering?
View solution
Q. What is the foundation of many social engineering attacks?
View solution
Q. In social engineering, what relies on the target feeling indebted or that they need to return a favor?
View solution
Q. What social engineering tactic focuses on making the target believe that you have the power or right to ask them to perform actions or provide information?
View solution
Q. In social engineering, what creates a sense of urgency by conveying that the action needs to be performed?
View solution
Q. What is a common target in social engineering that involves the fear that something will go wrong or that they will be punished if they do not respond or help?
View solution
Q. What is elicitation in the context of social engineering?
View solution
Q. What is a common tactic in elicitation that involves using open-ended or leading questions?
View solution
Q. What does impersonation involve in social engineering?
View solution
Q. What do quid pro quo attacks rely on in social engineering?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond CompTIA PenTest+ Certification Exam PT0 002? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!