exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 83 discussion

Actual exam question from Cisco's 200-201
Question #: 83
Topic #: 1
[All 200-201 Questions]

An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?

  • A. social engineering
  • B. eavesdropping
  • C. piggybacking
  • D. tailgating
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AhmedAbdalla
9 months, 4 weeks ago
The intruder used "social engineering" to trick the user into clicking a harmful link in an email, which allowed them to access the corporate network. Social engineering involves manipulating people to gain unauthorized access or information.
upvoted 1 times
...
Eng_ahmedyoussef
1 year, 10 months ago
Selected Answer: A
A. Social Engineering Method (Phishing Attack)
upvoted 2 times
...
weganos
1 year, 11 months ago
Since Phishing is not an answer I think social Engineering is the best option. Also there's a typo in the question "fink" should be "link".
upvoted 1 times
...
joseph267
2 years ago
here I think would be phishing but yeah A is the best option
upvoted 1 times
...
anonymous1966
2 years, 11 months ago
The only problem here is that Social Engineering is not a "testing method" it is an attack. But the other alternatives are wrong, so (A) is correct. Social engineering attacks leverage the weakest link, which is the human user. If the attacker can get the user to reveal information, it is much easier for the attacker to cause harm rather than use some other method of reconnaissance. This could be done through email or misdirection of web pages, which results in the user clicking something that leads to the attacker gaining information. Social engineering can also be done in person by an insider or outside entity or over the phone.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...