CompTIA A+ Core 2 Question F-8

Following an authorized person through a door or other security check point without showing proper identification or defeating a security mechanism is known as which of the following?

A. Hacking
B. Emulating
C. Partitioning
D. Tailgating

Correct Answer: D