ExamGecko
Question list
Search
Search

Related questions











Question 355 - 312-50v12 discussion

Report
Export

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

A.
Reverse Social Engineering
Answers
A.
Reverse Social Engineering
B.
Tailgating
Answers
B.
Tailgating
C.
Piggybacking
Answers
C.
Piggybacking
D.
Announced
Answers
D.
Announced
Suggested answer: B

Explanation:

. Identifying operating systems, services, protocols and devices,

. Collecting unencrypted information about usernames and passwords,

. Capturing network traffic for further analysis are passive network sniffing methods since with the help of them we only receive information and do not make any changes to the target network. When modifying and replaying the captured network traffic, we are already starting to make changes and actively interact with it.

asked 18/09/2024
Faria Sah
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first