Which tactic involves an authorized person allowing an unauthorized individual to pass through a secure door, for example by saying they forgot their ID badge?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which tactic involves an authorized person allowing an unauthorized individual to pass through a secure door, for example by saying they forgot their ID badge?

Explanation:
Piggybacking is the tactic where an authorized person allows an unauthorized individual to gain access through a secured door, often by exploiting a moment of trust or courtesy—such as saying they forgot their ID badge and relying on the other person to help them through. That exact scenario fits piggybacking: the door is opened for someone who shouldn’t have access because the authorized person is granting entry on their behalf. This is different from tailgating, where the unauthorized person follows closely behind someone with access and slips in without the authorized person explicitly letting them through. In the given situation, the authorization and the action of letting them pass come from the trusted individual, which is characteristic of piggybacking. Diversion theft and mobile-based social engineering involve different goals or methods and do not describe gaining entry through a secured door by leveraging another person’s access. For defense, emphasize not holding doors for others, use access-controlled entry that requires each person to badge in, and train staff to challenge unusual requests to bypass security.

Piggybacking is the tactic where an authorized person allows an unauthorized individual to gain access through a secured door, often by exploiting a moment of trust or courtesy—such as saying they forgot their ID badge and relying on the other person to help them through. That exact scenario fits piggybacking: the door is opened for someone who shouldn’t have access because the authorized person is granting entry on their behalf.

This is different from tailgating, where the unauthorized person follows closely behind someone with access and slips in without the authorized person explicitly letting them through. In the given situation, the authorization and the action of letting them pass come from the trusted individual, which is characteristic of piggybacking.

Diversion theft and mobile-based social engineering involve different goals or methods and do not describe gaining entry through a secured door by leveraging another person’s access. For defense, emphasize not holding doors for others, use access-controlled entry that requires each person to badge in, and train staff to challenge unusual requests to bypass security.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy