1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
4 years ago
8

You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure

d entry using ID cards. You observe several employees on a smoke break near once of the secured entrances. Once they are finished, you casually follow them in after they've unlocked the entry point with an ID card. What type of social engineering attack has occurred
Computers and Technology
1 answer:
olga55 [171]4 years ago
5 0

Answer:

Tailgating

Explanation:

Tailgating refers basically to an attacker seeking entry to a restricted area, where access is unattended or controlled by electronic access control. He/she can simply walk in behind a person who has legitimate access.

You might be interested in
Which protocol is responsible for transporting files between a client and a server?
Anastasy [175]
Abcdefghijklmnopqrstuvwxyz
3 0
2 years ago
Read 2 more answers
A folder has been shared with other users and set to read-only. What does this mean for users?
skelet666 [1.2K]

Answer:

it means they can not make edits or changes to said folder

Explanation:

8 0
3 years ago
Read 2 more answers
The labor market shows the:
Bad White [126]
<span>The labor market shows the </span><span>supply of available workers in relation to available work. The labor market is made up of </span>people who are working or looking for work. Those who are actively searching for work are calculated in the labor market as well. Those who are able to work but are not searching for work are not part of the labor market. 
8 0
3 years ago
Analyzing computer systems to gather potential legal evidence is computer ________
hodyreva [135]
It is called computer forensics.
5 0
3 years ago
Please help!!!!<br> Data means only facts. <br> A. TRUE B. FALSE
vredina [299]
B false data does not only have to be facts
6 0
3 years ago
Other questions:
  • Which term represents a computational instruction stored in computer memory?
    13·2 answers
  • Consider the following page reference string:
    12·1 answer
  • What is the name of the intel technology that allows a processor to handle two threads at the same time?
    6·1 answer
  • Which two statements give good definitions of financial credit
    8·1 answer
  • The piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    8·1 answer
  • WILL MARK BRAINIEST
    12·1 answer
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    5·2 answers
  • Create a parent class called Shape with width and height parameters of type double and a function that returns the area of the s
    12·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • What is the name of the most popular American computer repair shop?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!