Which one of the following is an example of electronic piggybacking?

A.
Attaching to a communications line and substituting data.
B.
Abruptly terminating a dial-up or direct-connect session.
C.
Following an authorized user into the computer room.
D.
Recording and playing back computer transactions.
Explanation:
Ok this is a weird little question. The term electronic is kinda of throwing me a bit. Alot of times piggybacking can be used in terms of following someone in a building.
Piggyback – Gaining unauthorized access to a system via another user’s legitimate connection.
(see between-the-lines entry)
Between-the-lines entry 0 Unauthorized access obtained by tapping the temporarily inactive
terminal of a legitimate user. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 914, 885
This question is poorly worded.
Following an authorized user into the computer room is not an “electronic” piggybacking.
It´s a Physical piggybacking.
An an “electronic” piggybacking would be somebody using a computer connection that someone forget to log off.
0
0
Stretching poor Krutz’s writing a bit too much here. If there is such a thing as ‘electronic piggy backing’ it would be a MITM (man-in-the-middle) attack. Doesn’t help the CISSP candidate one bit by making up new terminology along the way. Following another person through a door is a breach of Physical Access Control via Piggybacking.
0
0