Piggybacking {Ans: Piggybacking is when an authorized person allows (intentionally) others to pass through on their security principles. Double entry doors, security guards, and turnstiles would be used to deter piggybacking.}Intrusive Vs Non-Intrusive {Ans: As compared to a penetration test, a vulnerability scan tends to simply glance over a system to reveal compromises where the latter attempts to break through systems to reveal them. While a scan has the capability of slowing down a system during its operation it still allow for regular business operation to continue.}False Positive/Negative {Ans: Sometimes when a scan is conducted it may yield results that are misleading in the form of false positives and negatives. A false negative is when a system reports that a verified user is unauthorized. A false positive is when a system identifies an unauthorized user and allows them access.}Zero Day Attack {Ans: A zero-day attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer. Also called zero-day vulnerabilities. With a Zero-Day exploit, either there is no fix for the vulnerability yet, or the fix was just released and not everyone has patched their