Kevin, an IT security consultant, is working on contract for Davidson Avionics to audit the company’s network. He is given permission to perform any necessary tests. Kevin creates a fake company ID badge and uniform and waits by one of the company’s entrance doors. He follows an employee into the office after they use their valid access card to gain entrance.
What type of social engineering attack has Kevin employed?
D. Reverse social engineering.
The correct answer is C.
Tailgating implies access to enter into the building or secured area without the consent of the authorized person. It is the act of following an authorized person through a secure entrance, as when a polite user opens and then holds the door for those following. An attacker wears a fake badge and attempts to enter a secured area by closely following an authorized person through a door requiring key access.
Certified Ethical Hacker v9