Unauthorized Access in Secure Area | CompTIA Network+ Exam N10-007 Answer

Unauthorized Access in Secure Area

Prev Question Next Question

Question

A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group.

Which of the following security attacks is taking place?

A.

Evil twin B.

Social engineering C.

Insider threat D.

Phishing.

C.

Explanations

A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group.

Which of the following security attacks is taking place?

A.

Evil twin

B.

Social engineering

C.

Insider threat

D.

Phishing.

C.

The security guard's observation indicates the possibility of an insider threat. An insider threat is a security risk that arises from individuals who have authorized access to an organization's resources, but use that access for malicious purposes.

In this scenario, the individual in question is dressed like a lab technician and has entered a secure area of the hospital with a large group. It is possible that the individual has gained unauthorized access to the secure area using their legitimate access credentials or by exploiting a vulnerability in the access control system. The fact that the individual is dressed like a lab technician indicates that they are attempting to blend in with legitimate personnel and avoid suspicion.

Other security attacks mentioned in the options are not applicable in this scenario. An evil twin attack involves setting up a rogue wireless access point that mimics a legitimate access point to capture sensitive information from unsuspecting users. Social engineering is a technique used to manipulate people into divulging confidential information or performing actions that could compromise security. Phishing is a type of social engineering attack where attackers use email or other communication channels to trick victims into clicking on a link or opening an attachment that contains malware or leads to a fake website. None of these attacks are taking place in this scenario.

In summary, the most appropriate answer to this question is C. Insider threat.