New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA PT0-003 Exam - Topic 4 Question 17 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 17
Topic #: 4
[All PT0-003 Questions]

During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?

Show Suggested Answer Hide Answer
Suggested Answer: C

RFID Cloning:

RFID (Radio-Frequency Identification) cloning involves copying the data from an access badge and creating a duplicate that can be used for unauthorized entry.

Tools like Proxmark or RFID duplicators are commonly used for this purpose.

Why Not Other Options?

A (Smurfing): A network-based denial-of-service attack, unrelated to physical access.

B (Credential stuffing): Involves using stolen credentials in bulk for authentication attempts, unrelated to badge cloning.

D (Card skimming): Relates to stealing credit card information, not access badges.

CompTIA Pentest+ Reference:

Domain 3.0 (Attacks and Exploits)


Contribute your Thoughts:

0/2000 characters
Ernie
3 months ago
Credential stuffing is more about passwords, not badges!
upvoted 0 times
...
Aleta
3 months ago
Wait, can you really clone access badges like that?
upvoted 0 times
...
Starr
3 months ago
Totally agree, it's all about that RFID tech.
upvoted 0 times
...
Sharen
4 months ago
I thought it was card skimming at first.
upvoted 0 times
...
Jessenia
4 months ago
That's definitely RFID cloning.
upvoted 0 times
...
Mabelle
4 months ago
I practiced a similar question, and I think it was about cloning access cards. So, I would go with C as well.
upvoted 0 times
...
Asuncion
4 months ago
Card skimming sounds familiar, but I don't think it applies to access badges. I feel like it's definitely something to do with duplicating the badge.
upvoted 0 times
...
Candida
4 months ago
I'm not entirely sure, but I remember something about credential stuffing being more about online accounts, so that might not fit here.
upvoted 0 times
...
Art
5 months ago
I think this might be related to RFID technology, so I'm leaning towards option C, RFID cloning.
upvoted 0 times
...
Delsie
5 months ago
This seems pretty straightforward to me. The tester used the employee's badge information to create an unauthorized duplicate, which is the textbook definition of RFID cloning. I'm confident option C is the correct answer here.
upvoted 0 times
...
Alona
5 months ago
I'm a little uncertain about this one. The question mentions the tester obtaining the badge and creating a duplicate, but I'm not sure if that's considered smurfing or RFID cloning. I'll have to review the differences between those two attack types.
upvoted 0 times
...
Julio
5 months ago
Okay, I've got this. The tester used the employee's access badge to create an unauthorized duplicate. That's the definition of RFID cloning, so I'm going with option C.
upvoted 0 times
...
Lindsey
5 months ago
Hmm, I'm a bit confused on this one. I'm not sure if it's RFID cloning or card skimming. They both involve duplicating access cards, but I'll have to think through the details more to decide.
upvoted 0 times
...
Tran
5 months ago
I'm pretty sure this is RFID cloning. The question mentions the tester using the badge information to create a duplicate, which sounds like the definition of RFID cloning.
upvoted 0 times
...
Raylene
1 year ago
I'm not sure, but I think D) Card skimming could also be a possibility since it involves obtaining card information without authorization.
upvoted 0 times
...
Venita
1 year ago
B) Credential stuffing? Nah, this is straight-up RFID cloning. The tester's got skills, that's for sure.
upvoted 0 times
...
Ilda
1 year ago
A) Smurfing? Sounds like a job for the Smurf squad! But in this case, it's all about that badge cloning.
upvoted 0 times
...
Wenona
1 year ago
I agree with Lavonne, because the penetration tester is creating a duplicate access badge using RFID information.
upvoted 0 times
...
Laine
1 year ago
D) Card skimming? More like card swiping, am I right? This tester is really going places, literally and figuratively.
upvoted 0 times
Curt
1 year ago
A) Smurfing doesn't seem right. The tester is definitely going for unauthorized access.
upvoted 0 times
...
Dottie
1 year ago
A) Smurfing? That doesn't sound right. The tester definitely crossed a line with this stunt.
upvoted 0 times
...
Melissia
1 year ago
C) RFID cloning seems like the best fit here. The tester is definitely taking advantage of the situation.
upvoted 0 times
...
Amie
1 year ago
C) RFID cloning is a serious security breach. The company needs to tighten their access control measures.
upvoted 0 times
...
Dell
1 year ago
D) Card swiping sounds more accurate. This tester is definitely bold.
upvoted 0 times
...
Benedict
1 year ago
D) Card skimming
upvoted 0 times
...
Barrett
1 year ago
D) Card swiping sounds more accurate. This tester is definitely bold.
upvoted 0 times
...
Erick
1 year ago
D) Card skimming
upvoted 0 times
...
Donette
1 year ago
C) RFID cloning
upvoted 0 times
...
Carlota
1 year ago
B) Credential stuffing
upvoted 0 times
...
Edward
1 year ago
C) RFID cloning
upvoted 0 times
...
Cherrie
1 year ago
B) Credential stuffing
upvoted 0 times
...
Lashandra
1 year ago
A) Smurfing
upvoted 0 times
...
Jimmie
1 year ago
A) Smurfing
upvoted 0 times
...
...
Lavonne
1 year ago
I think the answer is C) RFID cloning.
upvoted 0 times
...
Dean
1 year ago
C) RFID cloning - that's the one! Gotta love that fancy technology, even if it's used for nefarious purposes.
upvoted 0 times
Cecilia
1 year ago
D) Card skimming
upvoted 0 times
...
Maricela
1 year ago
C) RFID cloning
upvoted 0 times
...
Bronwyn
1 year ago
B) Credential stuffing
upvoted 0 times
...
Cary
1 year ago
A) Smurfing
upvoted 0 times
...
...

Save Cancel