ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 191 - CISSP-ISSAP discussion

Report
Export

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

A.
In person attack
Answers
A.
In person attack
B.
Third-party authorization attack
Answers
B.
Third-party authorization attack
C.
Impersonation attack
Answers
C.
Impersonation attack
D.
Important user posing attack
Answers
D.
Important user posing attack
Suggested answer: C
asked 18/09/2024
Marc Aurele ALLOTCHENOU
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first