Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
The social engineering vulnerability that occurs when someone follows a technician into a server room without using a key card is called "tailgating."
Tailgating is a technique used by attackers to gain unauthorized access to secure areas by following authorized personnel without being challenged. In this case, the attacker would wait for an authorized person, such as a technician, to enter the server room and then follow closely behind them before the door closes.
The goal of tailgating is to bypass security measures that are in place to prevent unauthorized access, such as key card access or biometric authentication. By tailgating, the attacker can gain access to sensitive information or equipment that they wouldn't be able to access otherwise.
Shoulder surfing is a different type of social engineering vulnerability, which involves someone looking over the shoulder of an individual to gain access to sensitive information. For example, someone might look over a person's shoulder while they enter their password or PIN number on a keyboard or ATM.
Man-in-the-middle (MITM) attacks involve an attacker intercepting communication between two parties and altering the messages being exchanged. This type of attack is commonly used in network attacks.
Impersonation involves an attacker pretending to be someone they're not, such as a company employee, in order to gain access to sensitive information or equipment.