Ethical Hacking Essentials Practice Test

Image Description

Question: 1 / 640

In a scenario where an attacker contacts IT support claiming to be a distressed employee, what is the primary tactic employed by the attacker?

Intimidation

Authority

Compromise

Deception

The primary tactic employed by an attacker contacting IT support while posing as a distressed employee falls under deception. This approach involves manipulating the perceptions of the IT support personnel to gain unauthorized access or information. By fabricating a narrative of urgency, the attacker aims to instill a sense of trust and urgency, prompting IT support to act quickly without verifying the true identity of the requester.

In this scenario, the attacker might leverage emotional cues and create a story that evokes sympathy, creating a deceptive context that makes it more likely for IT staff to comply with their requests. This tactic exploits human psychology rather than relying solely on technical vulnerabilities, highlighting the importance of awareness and verification in security protocols.

The other options, while potentially relevant in different contexts, do not accurately encapsulate the core tactic being used here. Authority involves leveraging positional power, which is not applicable in this case since the attacker is impersonating someone else. Intimidation might involve threatening behavior, which is not the case if the attacker is posing as a distressed employee. Compromise generally refers to a situation where access is gained through previous breaches, which also does not apply in this scenario of impersonation.

Get further explanation with Examzify DeepDiveBeta
Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy