The answer is C. This is an example of piggybacking.
EXPLANATION
Piggyback is one of the tactics that an attacker can use. Piggyback attack is one of the active forms of wiretapping. In piggyback, the attacker will gain access to the system by the interlude of inactivity in another person’s legitimate connection. The piggyback attack is also known as the between the line attack and the piggyback-entry wiretapping.
To be more specific, in the security field, piggyback refers to the time when the attacker gains entry into a restricted area by tagging along with other people who have the key to the restricted area. Piggyback is done by tagging along with an authorized person and passing into a forbidden place.
The concept of piggyback does not only apply in the real security field, but it can also be used in computer networks or workstation. Anything that uses the third party’s help to access something, can be called piggyback.
The example above is a form of piggyback because the person enters a private building by tagging along with another resident who holds access to the building. The attacker talks to the person who holds access and helps the person in order to tag along inside the building. This is a definite piggyback attack, so the answer is C.
LEARN MORE
If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:
ISIS attacked Paris in 2015: brainly.com/question/11644033
September 11 attack: brainly.com/question/2910062
KEYWORD: piggyback attack, attacker, security
Subject: Social Studies
Class: College
Subchapter: Piggyback attack