A person walks up to a group of people who have physical access to a network operations room.
As some of the group enters the room, this person walks into the room behind the group without
providing credentials to gain access. Which of the following would BEST describe this activity?
A.
Walk behind
B.
Shoulder surfing
C.
Tailgating
D.
Social engineering