An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are.The controls used by the receptionist are in place to prevent which of the following types of attacks?

A. Tailgating
B. Shoulder surfing
C. Impersonation
D. Hoax

Answer: C. Impersonation

Computer Science & Information Technology

You might also like to view...

Using your computer for non-work activities while you are being paid to work is known as ________

A) cyberbreaking B) cyberlazing C) cyberloafing D) cybersleeping

Computer Science & Information Technology

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation?

A. Allow the contractor to reset switches to factory defaults B. Check the cabling on all switches for improper crossover use C. Document the changes that were made D. Downgrade firmware and restore backup configuration

Computer Science & Information Technology