What are two examples of an attacker using social engineering? (Choose two.)
A.
Convincing an employee that they are also an employee
B.
Leveraging open-source intelligence to gather information about a high-level executive
C.
Acting as a company representative and asking for personal information not relevant to the reason for their call
D.
Compromising a website and configuring it to automatically install malicious files onto systems that visit the page
The Answer Is:
A, C
This question includes an explanation.
Explanation:
Social engineering attacks manipulate human trust to gain unauthorized access or information. Convincing an employee that an attacker is also an employee builds rapport, lowering defenses for information disclosure or credential sharing. Similarly, impersonating a company representative and requesting unrelated personal data exploits authority bias to deceive victims. These tactics exploit psychological vulnerabilities rather than technical flaws and are prevalent initial steps in multi-stage attacks. Palo Alto Networks highlights the importance of training, multi-factor authentication, and behavior-based threat detection to mitigate social engineering risks effectively.
PCCP PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"