Question 245:
Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
Answer options:
A. Shoulder surfing B. Man-in-the-middle C. Tailgating D. Impersonation
Answer correct:
C