Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which social engineering technique involves an attacker gaining unauthorized access to a physical space by following someone who has legitimate access?

  1. Piggybacking

  2. Tailgating

  3. Shoulder Surfing

  4. Eavesdropping

The correct answer is: Piggybacking

The technique where an attacker gains unauthorized access to a physical space by closely following someone who has legitimate access is known as tailgating. This method exploits the trust that people often place in others, allowing an unauthorized individual to slip through a security checkpoint. Tailgating typically occurs in scenarios where an access control system requires a keycard or some form of authentication; the attacker relies on the confusion or distraction of the authorized individual to enter without proper authorization. By following closely behind, the attacker may avoid detection, making this a prevalent tactic in social engineering. While piggybacking is sometimes used interchangeably with tailgating, it more specifically refers to an instance where the authorized person is aware of the follower, granting them permission to enter. In contrast, tailgating explicitly entails the unauthorized individual insinuating themselves without explicit consent from the authorized person. Shoulder surfing involves watching an individual enter sensitive information, such as passwords, which is unrelated to physical access to premises. Eavesdropping, as well, pertains to listening to private conversations or accessing confidential discussions rather than gaining entry to a location. Thus, tailgating is the most accurate term for the described social engineering technique.