Which tactic describes an attacker following closely behind an authorized person through a door that requires key access?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which tactic describes an attacker following closely behind an authorized person through a door that requires key access?

Explanation:
Tailgating is a social engineering tactic where an attacker follows closely behind an authorized person to gain entry through a door or gate that requires key access. By exploiting the human tendency to be courteous or to assume the person in front belongs there, the attacker slips past the access control without presenting credentials themselves. This makes physical security breaches easier because the attacker relies on legitimate credentials held by someone else rather than guessing or stealing them. The other options describe different attack vectors: vishing targets people over the phone to obtain information, a honey trap lures with an enticing setup to gain trust, and baiting uses a tempting item or opportunity to persuade a target to take action. To defend against tailgating, enforce strong entry controls (like turnstiles or mantraps), train staff to challenge or not hold the door for others, and ensure proper badge usage and monitoring at access points.

Tailgating is a social engineering tactic where an attacker follows closely behind an authorized person to gain entry through a door or gate that requires key access. By exploiting the human tendency to be courteous or to assume the person in front belongs there, the attacker slips past the access control without presenting credentials themselves. This makes physical security breaches easier because the attacker relies on legitimate credentials held by someone else rather than guessing or stealing them. The other options describe different attack vectors: vishing targets people over the phone to obtain information, a honey trap lures with an enticing setup to gain trust, and baiting uses a tempting item or opportunity to persuade a target to take action. To defend against tailgating, enforce strong entry controls (like turnstiles or mantraps), train staff to challenge or not hold the door for others, and ensure proper badge usage and monitoring at access points.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy