(ISC)2(ISC)2
CISSP-ISSAP · Question #129
CISSP-ISSAP Question #129: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP-ISSAP to reveal the answer and full explanation for question #129. The question stem and answer options stay visible for context.
Infrastructure Security
Question
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
Options
- AIn person attack
- BThird-party authorization attack
- CImpersonation attack
- DImportant user posing attack
Unlock CISSP-ISSAP to see the answer
You've previewed enough free CISSP-ISSAP questions. Unlock CISSP-ISSAP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Social engineering#Impersonation#Physical security#Attack vectors