Which one of the following is an example of electronic piggybacking?

Which one of the following is an example of electronic piggybacking?

Which one of the following is an example of electronic piggybacking?

A.
Attaching to a communications line and substituting data.

B.
Abruptly terminating a dial-up or direct-connect session.

C.
Following an authorized user into the computer room.

D.
Recording and playing back computer transactions.

Explanation:
Ok this is a weird little question. The term electronic is kinda of throwing me a bit. A

lot of times piggybacking can be used in terms of following someone in a building.
Piggyback – Gaining unauthorized access to a system via another user’s legitimate connection.
(see between-the-lines entry)
Between-the-lines entry 0 Unauthorized access obtained by tapping the temporarily inactive
terminal of a legitimate user. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 914, 885



Leave a Reply 2

Your email address will not be published. Required fields are marked *

three × four =


Techbro

Techbro

This question is poorly worded.

Following an authorized user into the computer room is not an “electronic” piggybacking.
It´s a Physical piggybacking.

An an “electronic” piggybacking would be somebody using a computer connection that someone forget to log off.

Ahmed

Ahmed

Stretching poor Krutz’s writing a bit too much here. If there is such a thing as ‘electronic piggy backing’ it would be a MITM (man-in-the-middle) attack. Doesn’t help the CISSP candidate one bit by making up new terminology along the way. Following another person through a door is a breach of Physical Access Control via Piggybacking.