5:00
Stop
CEH - Cryptography - Public Key Infrastructure (PKI)
Intermediate
1/5
In social engineering, what is the term for a technique where an attacker follows an authorized person into a secured area by walking in behind them?
Intermediate