ISC Exam Questions

When an intruder uses another person’s access card to gain entrance into a facility, this is c

When an intruder uses another person’s access card to gain entrance into a facility, this is called:

A.
Forced entry

B.
Piggybacking

C.
Mantrapping

D.
Wiretapping

Explanation:
Piggybacking can be prevented by increased security at each entrance
and educating employees. Piggybacking has a more basic definition of an entity using
another entity’s legitimate credentials for access. This means that a piggybacking
attack is not limited to physical security issues.