Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 57 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 57
Topic #: 1
[All PT0-002 Questions]

A penetration tester approaches a company employee in the smoking area and starts a conversation about the company's recent social event. After a few minutes, the employee holds the badge-protected door open for the penetration tester and both enter the company's building. Which of the following attacks did the penetration tester perform?

Show Suggested Answer Hide Answer
Suggested Answer: D

In this scenario, the penetration tester performed a 'Tailgating' attack (D), where the tester follows closely behind a legitimate employee to gain unauthorized access to a secure area without being noticed. This social engineering technique relies on exploiting human tendencies to be polite or avoid confrontation, rather than using technical hacking methods. The tester engaged the employee in casual conversation to appear less suspicious and took advantage of the situation when the employee, perhaps distracted or feeling socially obliged, held the door open for them.


Contribute your Thoughts:

Kristian
6 months ago
I wonder if the penetration tester had a clipboard and a 'please sign here' line. That would've sealed the deal even quicker! Definitely tailgating though.
upvoted 0 times
...
Makeda
6 months ago
I bet the penetration tester was like, 'Hey, did you hear about the company's free doughnuts in the breakroom?' Just to really seal the deal. Classic tailgating!
upvoted 0 times
Eun
5 months ago
Employee: Sure, no problem. Come on in.
upvoted 0 times
...
Marilynn
5 months ago
Penetration Tester: Oh, I missed out on those. Mind holding the door for me?
upvoted 0 times
...
Ryann
6 months ago
Employee: Yeah, I heard about the doughnuts. They were delicious!
upvoted 0 times
...
...
Weldon
6 months ago
Social engineering at its finest! The penetration tester should probably buy that employee a coffee or something, they really helped out there. Tailgating all the way.
upvoted 0 times
...
Gayla
6 months ago
Haha, the penetration tester really went for the 'friendly chat' technique. Gotta hand it to them, that's a smooth move. Definitely tailgating in my opinion.
upvoted 0 times
Truman
6 months ago
Yeah, that was a sneaky move. Definitely tailgating.
upvoted 0 times
...
Adell
6 months ago
No problem, always happy to help out.
upvoted 0 times
...
Lamonica
6 months ago
Thanks for holding the door, much appreciated.
upvoted 0 times
...
...
Bo
6 months ago
I'd have to go with option D - tailgating. Tricking the employee into holding the door open is a low-tech but effective way to bypass security protocols. Clever approach, I must say.
upvoted 0 times
Rickie
5 months ago
Exactly. It's a common tactic used by attackers to gain unauthorized access to secure areas.
upvoted 0 times
...
Dorothy
5 months ago
Yeah, I've heard about that. Tricking someone into letting you in by following closely behind them, right?
upvoted 0 times
...
Shalon
5 months ago
You know, it's important to always be aware of security risks. Like tailgating, for example.
upvoted 0 times
...
Marjory
5 months ago
No problem, just trying to be polite.
upvoted 0 times
...
Micheline
5 months ago
Thanks for holding the door open for me. I appreciate it.
upvoted 0 times
...
Marsha
5 months ago
I see your point. I'll be more cautious from now on.
upvoted 0 times
...
Jolanda
5 months ago
Well, you never know who could be tailgating behind you, trying to gain unauthorized access.
upvoted 0 times
...
Carlota
6 months ago
Oops, I didn't even think about that. Thanks for the heads up.
upvoted 0 times
...
Anglea
6 months ago
Well, you just let me in without verifying if I have access. It's called tailgating.
upvoted 0 times
...
Johnson
6 months ago
Oh really? How so?
upvoted 0 times
...
Alison
6 months ago
Oh really? How so?
upvoted 0 times
...
Rima
6 months ago
You know, that's actually a security risk. You should be more careful next time.
upvoted 0 times
...
Glen
6 months ago
You know, that's actually a security risk. You should be more careful next time.
upvoted 0 times
...
Izetta
6 months ago
No problem, just trying to be polite.
upvoted 0 times
...
Lezlie
6 months ago
No problem, just trying to be polite.
upvoted 0 times
...
Twana
6 months ago
Thanks for holding the door for me, much appreciated.
upvoted 0 times
...
Shelba
6 months ago
Thanks for holding the door for me, much appreciated.
upvoted 0 times
...
...
Leanora
7 months ago
Wow, that's a classic case of social engineering! The penetration tester really played on the employee's trust to gain unauthorized access. Definitely looks like a textbook example of tailgating.
upvoted 0 times
Isidra
5 months ago
Employee: Oh no, I need to be more careful next time.
upvoted 0 times
...
Catina
5 months ago
Penetration Tester: *nods*
upvoted 0 times
...
Willis
5 months ago
Employee: Wait, did I just fall for a tailgating attack?
upvoted 0 times
...
Anglea
5 months ago
Penetration Tester: *smirks*
upvoted 0 times
...
Ocie
5 months ago
Employee: No problem, always happy to help out.
upvoted 0 times
...
Jamie
6 months ago
Penetration Tester: *smirks*
upvoted 0 times
...
Gerald
6 months ago
Employee: *unaware of the security breach*
upvoted 0 times
...
Pa
6 months ago
Employee: No problem, always happy to help out.
upvoted 0 times
...
Pearline
6 months ago
Penetration Tester: Yeah, it was fun. Thanks for holding the door for me.
upvoted 0 times
...
Hester
6 months ago
Employee: Hey, did you enjoy the social event last week?
upvoted 0 times
...
Jeanice
6 months ago
Penetration Tester: Yeah, it was great! By the way, thanks for holding the door open for me.
upvoted 0 times
...
Nikita
7 months ago
Employee: Hey, did you enjoy the social event last week?
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77