4:59
Stop
CEH - Evading IDS, Firewalls, and Honeypots - IDS, IPS, Firewall, and Honeypot Solutions
Intermediate
1/5
In social engineering, what is the term for a technique where an attacker follows an authorized person into a secured area by walking in behind them?
Intermediate