List of questions
Related questions
Question 191 - CISSP-ISSAP discussion
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
A.
In person attack
B.
Third-party authorization attack
C.
Impersonation attack
D.
Important user posing attack
Your answer:
0 comments
Sorted by
Leave a comment first