Skip to content

Chapter 47 Quiz: Physical Security & Social Engineering

Test your knowledge of tailgating, badge cloning, phishing attack types, security awareness programs, legal frameworks, and ethical considerations in social engineering assessments.


Questions

1. During a physical security assessment, a red team operator follows an authorized employee through a badge-controlled door without presenting credentials. What is this technique called, and what physical control failure does it exploit?

  • A) Lock picking — it exploits weak lock mechanisms
  • B) Tailgating (piggybacking) — it exploits the lack of anti-tailgating controls such as mantraps, turnstiles, or enforced badge-in/badge-out policies
  • C) Badge cloning — it exploits RFID vulnerabilities
  • D) Dumpster diving — it exploits improper document disposal
Answer

B — Tailgating (piggybacking) — it exploits the lack of anti-tailgating controls such as mantraps, turnstiles, or enforced badge-in/badge-out policies

Tailgating exploits human courtesy and insufficient physical access controls. Employees frequently hold doors for people behind them, especially when the follower appears to be a coworker carrying equipment. Effective mitigations include mantraps (interlocking doors that enforce single-person entry), full-height turnstiles, security guard verification, and organizational culture that normalizes challenging unrecognized individuals.


2. A red team operator uses a Proxmark3 device to clone an employee's HID Prox card from several feet away. What makes legacy 125 kHz proximity cards vulnerable to this attack?

  • A) The cards use strong encryption but have a known key management weakness
  • B) Legacy 125 kHz proximity cards transmit a static, unencrypted card ID that can be read and replicated without any cryptographic authentication
  • C) The cards require physical contact to read, but the reader firmware has a bypass
  • D) The cards use rolling codes, but the algorithm has been publicly broken
Answer

B — Legacy 125 kHz proximity cards transmit a static, unencrypted card ID that can be read and replicated without any cryptographic authentication

HID ProxCard II and similar 125 kHz cards store a static facility code and card number that is transmitted in the clear when the card enters a reader's electromagnetic field. A Proxmark3 or similar device can read this data from a distance (up to several feet with a high-gain antenna) and write it to a blank card. Modern countermeasures include 13.56 MHz smart cards (iCLASS SE, DESFire) with mutual authentication and encryption.


3. What is the primary difference between phishing, spear phishing, and whaling?

  • A) They use different protocols: phishing uses email, spear phishing uses SMS, and whaling uses phone calls
  • B) Phishing targets a broad audience with generic lures; spear phishing targets specific individuals or groups with personalized content; whaling specifically targets senior executives or high-value individuals
  • C) Phishing is legal; spear phishing and whaling are always illegal
  • D) The three terms are interchangeable and describe the same technique
Answer

B — Phishing targets a broad audience with generic lures; spear phishing targets specific individuals or groups with personalized content; whaling specifically targets senior executives or high-value individuals

The three techniques exist on a targeting spectrum. Phishing casts a wide net with generic messages (fake invoices, account alerts). Spear phishing uses OSINT to craft personalized messages for specific individuals or roles (referencing real projects, colleagues, or events). Whaling targets C-suite executives with highly tailored pretexts (board communications, M&A documents, legal matters) that leverage the target's authority and access levels.


4. A red team is planning a vishing (voice phishing) campaign against a target organization's help desk. Which legal and ethical requirement must be satisfied before initiating the campaign?

  • A) No specific authorization is needed for vishing since it does not involve computer systems
  • B) The vishing campaign must be explicitly authorized in the Rules of Engagement, with defined scope, permitted pretexts, call recording consent requirements, and escalation procedures
  • C) Only verbal approval from the IT manager is required
  • D) Vishing campaigns only require authorization if they target executives
Answer

B — The vishing campaign must be explicitly authorized in the Rules of Engagement, with defined scope, permitted pretexts, call recording consent requirements, and escalation procedures

Social engineering attacks including vishing must be explicitly scoped in the RoE. The document should specify which employees or departments can be targeted, approved pretexts, whether calls can be recorded (subject to local wiretapping laws), boundaries for information that can be requested, and procedures for employees who become distressed. Many jurisdictions require all-party consent for call recording.


5. During a physical penetration test, the operator gains access to an office area and discovers unlocked workstations with active sessions, sensitive documents on desks, and passwords written on sticky notes. How should these findings be documented?

  • A) Take photographs of all findings and include them unredacted in the report
  • B) Photograph evidence with care to protect PII (redacting personal information in the report), document each finding's location and risk impact, and chain all evidence per the RoE data handling requirements
  • C) Only verbally report findings to the client without photographic evidence
  • D) Remove the sticky notes and shred the documents to demonstrate impact
Answer

B — Photograph evidence with care to protect PII (redacting personal information in the report), document each finding's location and risk impact, and chain all evidence per the RoE data handling requirements

Physical assessment evidence must be documented thoroughly for the report while respecting privacy obligations. Photographs prove findings but should have PII redacted in reports (employee names, screen content containing personal data). Evidence should be timestamped, location-tagged, and handled per the RoE data handling procedures. The tester should never remove, modify, or destroy organizational property.


6. What is pretexting in the context of social engineering, and why is it effective?

  • A) Pretexting is the act of researching a target before an attack
  • B) Pretexting is creating a fabricated scenario (role, identity, or situation) that establishes trust and provides a plausible reason for the target to comply with the attacker's request
  • C) Pretexting is sending text messages with malicious links
  • D) Pretexting is physically entering a building under a false identity
Answer

B — Pretexting is creating a fabricated scenario (role, identity, or situation) that establishes trust and provides a plausible reason for the target to comply with the attacker's request

Pretexting leverages psychological principles of authority, social proof, and reciprocity. An attacker posing as an IT support technician (authority), a fellow employee from another office (social proof), or a vendor who helped the employee previously (reciprocity) creates a believable context that lowers the target's defenses. Effective pretexts are supported by OSINT — using real names, projects, and organizational details to enhance credibility.


7. An organization implements a security awareness training program but sees no reduction in phishing click rates after six months. What is the most likely deficiency in the program?

  • A) The training platform vendor is not reputable
  • B) The program relies on annual compliance-style training without regular simulated phishing exercises, role-specific content, positive reinforcement, or measurable behavior change metrics
  • C) Employees have too much work to attend training
  • D) The phishing simulations are too realistic
Answer

B — The program relies on annual compliance-style training without regular simulated phishing exercises, role-specific content, positive reinforcement, or measurable behavior change metrics

Effective security awareness programs require continuous reinforcement through regular phishing simulations with increasing sophistication, immediate feedback when users click simulated phishes, role-specific training (finance teams targeted with BEC scenarios, executives with whaling simulations), positive recognition for correct behavior (reporting phishes), and metrics tracking behavioral change over time rather than just completion rates.


8. A social engineer calls the target organization's reception and claims to be from a fire safety inspection company, requesting a tour of the server room to check fire suppression systems. What social engineering principle is being exploited?

  • A) Scarcity — creating urgency around a limited-time offer
  • B) Authority — impersonating a regulatory or safety official to leverage assumed authority and compliance obligations
  • C) Reciprocity — offering a free inspection in exchange for access
  • D) Consensus — claiming that other companies in the building have already participated
Answer

B — Authority — impersonating a regulatory or safety official to leverage assumed authority and compliance obligations

The authority principle is one of Robert Cialdini's six principles of influence. People tend to comply with requests from perceived authority figures, especially those associated with regulatory compliance or safety. Impersonating inspectors, auditors, or law enforcement creates psychological pressure to comply without questioning. Countermeasures include verification procedures — calling the purported agency directly using independently sourced contact information.


9. What is a "watering hole" attack, and how does it differ from traditional phishing?

  • A) A physical attack targeting water utility infrastructure
  • B) An attack that compromises a website frequently visited by the target group, serving malware to visitors — unlike phishing, the attacker does not send messages to targets but instead waits for them to visit the compromised site
  • C) A phishing attack that targets employees during lunch breaks
  • D) A denial-of-service attack against the target's web infrastructure
Answer

B — An attack that compromises a website frequently visited by the target group, serving malware to visitors — unlike phishing, the attacker does not send messages to targets but instead waits for them to visit the compromised site

Watering hole attacks identify websites commonly visited by the target demographic (industry forums, professional associations, niche news sites), compromise those sites, and embed exploit code or malicious downloads. This approach bypasses email security controls entirely and is highly effective because victims visit the site through normal browsing behavior. The name derives from predators waiting at watering holes for prey.


10. During a physical security assessment, the red team drops USB drives labeled "Employee Bonus Structure 2025" in the target organization's parking lot. What attack technique is this, and what is it designed to test?

  • A) Network pivoting — the USB drives contain network scanning tools
  • B) USB baiting — it tests whether employees will insert unknown USB devices into corporate systems, bypassing physical and endpoint security controls
  • C) Data exfiltration — the USB drives are designed to steal files
  • D) Supply chain attack — the USB drives impersonate legitimate vendor hardware
Answer

B — USB baiting — it tests whether employees will insert unknown USB devices into corporate systems, bypassing physical and endpoint security controls

USB baiting exploits human curiosity by labeling drives with enticing content descriptions. When inserted, the drives can execute malicious payloads (HID attacks using Rubber Ducky devices, autorun malware, or simply callback beacons). This technique tests the organization's security awareness training effectiveness, endpoint USB device control policies, and incident reporting culture. Labels are designed to trigger curiosity or urgency.


11. What legal consideration must red teams be aware of when conducting social engineering assessments that involve impersonating law enforcement or government officials?

  • A) It is always legal if authorized in the RoE
  • B) Impersonating law enforcement or government officials is a criminal offense in most jurisdictions regardless of RoE authorization; these pretexts must be explicitly avoided unless specific legal counsel has confirmed permissibility
  • C) It is legal as long as the impersonation occurs over the phone and not in person
  • D) It is legal if the red team informs the target they are being tested within 24 hours
Answer

B — Impersonating law enforcement or government officials is a criminal offense in most jurisdictions regardless of RoE authorization; these pretexts must be explicitly avoided unless specific legal counsel has confirmed permissibility

Social engineering RoE must respect legal boundaries that cannot be waived by the client. Impersonating police officers, federal agents, health inspectors, or other government officials is a criminal offense (e.g., 18 U.S.C. Section 912 in the US). Professional red teams maintain a list of prohibited pretexts and consult legal counsel when engagements require boundary-testing social engineering scenarios.


12. What is the difference between a "drop box" and a "rogue access point" in physical red team operations?

  • A) They are the same device with different names
  • B) A drop box is a small covert network implant (e.g., Raspberry Pi with remote access) physically installed on the target network; a rogue access point is a wireless AP deployed to capture credentials or provide remote wireless access to the network
  • C) A drop box collects physical documents; a rogue access point jams wireless signals
  • D) A drop box is installed in the server room; a rogue access point is installed in the parking lot
Answer

B — A drop box is a small covert network implant (e.g., Raspberry Pi with remote access) physically installed on the target network; a rogue access point is a wireless AP deployed to capture credentials or provide remote wireless access to the network

Drop boxes are small computing devices (Raspberry Pi, LAN Turtle, Shark Jack) that a physical penetration tester installs on the internal network to provide persistent remote access. Rogue access points (Evil Twin APs) impersonate legitimate wireless networks to capture WPA handshakes or create captive portals harvesting credentials. Both require physical access to deploy and must be removed during the engagement cleanup phase.


13. A security awareness program includes a phishing simulation where an employee reports the simulated phish to the security team. What is the most effective response to reinforce positive security behavior?

  • A) No response is necessary — the simulation was just a test
  • B) Immediately acknowledge and thank the employee for reporting, provide positive feedback, and use the report as a teaching moment to reinforce the organization's phishing reporting culture
  • C) Inform the employee they failed the test because they opened the email
  • D) Share the employee's name with their manager for recognition during performance review
Answer

B — Immediately acknowledge and thank the employee for reporting, provide positive feedback, and use the report as a teaching moment to reinforce the organization's phishing reporting culture

Positive reinforcement for correct reporting behavior is the most effective way to build a strong security culture. Employees who report phishing attempts should receive immediate acknowledgment, thanks, and possibly recognition through gamification programs. Punitive responses (shaming, negative consequences for clicking) discourage reporting and create a culture of fear rather than security engagement.


14. What is "smishing," and what makes it potentially more effective than email-based phishing?

  • A) Phishing via social media direct messages
  • B) SMS-based phishing that exploits the higher trust users place in text messages, the limited URL preview capability of SMS clients, and the tendency to read and respond to texts more quickly than emails
  • C) Phishing that uses encrypted messaging apps
  • D) Voice phishing conducted via smartphone
Answer

B — SMS-based phishing that exploits the higher trust users place in text messages, the limited URL preview capability of SMS clients, and the tendency to read and respond to texts more quickly than emails

Smishing (SMS phishing) leverages several advantages over email phishing: users generally trust SMS more than email, SMS clients provide minimal URL previews and metadata, phone screens show limited content encouraging hasty clicks, SMS bypasses email security controls entirely, and people tend to respond to texts more quickly and with less scrutiny. Smishing is increasingly used in MFA bypass attacks and credential harvesting.


15. An organization wants to measure the effectiveness of its physical security controls after a red team assessment. Which metric would best indicate improvement?

  • A) The total number of security cameras installed
  • B) The rate at which employees challenge unrecognized individuals, report tailgating attempts, and refuse to hold doors for unbadged visitors — measured through repeat physical testing
  • C) The annual budget allocated to physical security
  • D) The number of badge readers installed per floor
Answer

B — The rate at which employees challenge unrecognized individuals, report tailgating attempts, and refuse to hold doors for unbadged visitors — measured through repeat physical testing

Technology alone (cameras, badge readers) does not measure security effectiveness. The true measure is human behavior — do employees actively challenge strangers, enforce badge policies, report suspicious activity, and follow physical security procedures? Repeat testing with metrics comparison (challenge rate, report rate, successful entry rate) across assessments provides empirical evidence of security culture improvement.


Scoring

Score Performance
14–15 Expert — Physical security and social engineering concepts fully internalized
11–13 Proficient — Ready to conduct physical and social engineering assessments
8–10 Developing — Review Chapter 47 pretexting, legal framework, and awareness sections
<8 Foundational — Re-read Chapter 47 before proceeding

Return to Chapter 47 | Next: Chapter 48 Quiz