An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are.The controls used by the receptionist are in place to prevent which of the following types of attacks?

A. Tailgating
B. Shoulder surfing
C. Impersonation
D. Hoax


Answer: C. Impersonation

Computer Science & Information Technology

You might also like to view...

Which of the following examples shows the correct syntax for the lang attribute?

A) "xml:lang=en lang=en" B) xml:lang='en' lang='en' C) xml:lang="en" lang="en" D) xml-lang="en" lang="en"

Computer Science & Information Technology

Definition lists display two pieces of information:

a. Definition and label b. Frequently asked question (FAQ) and answer c. Table of contents and nested list d. Keyword and definition

Computer Science & Information Technology

What are some of the different reasons to use VLANs?

What will be an ideal response?

Computer Science & Information Technology

According to the TCP/IP model, which layer is responsible for end-to-end communication and error-free delivery of data?

A. Link B. Application C. Internet D. Transport

Computer Science & Information Technology