Question
Question 1 What tactic is being used when an attacker trailing closely behind an
employee enters a restricted area without any security credentials by utilizing their
proximity to another employee with security clearance?
Question 1 options:
Shoulder surfing
Footprinting
Piggybacking
Dumpster diving
Question 2 To see additional parameters that can be used with the Netcat command,
what should you type at the command prompt?
Question 2 options:
nc -lookup
nc -z
nc -h
nc -up
Question 3 Which process utilizes the knowledge of human nature to get information
from people to use for executing an attack on a computer network?
Question 3 options:
fingerprinting
footprinting
zone transferring
social engineering