exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 630 discussion

Actual exam question from CompTIA's SY0-601
Question #: 630
Topic #: 1
[All SY0-601 Questions]

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

  • A. Phone call
  • B. Instant message
  • C. Email
  • D. Text message
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
subaie503
Highly Voted 1 year, 3 months ago
Real world: A CompTIA world: C
upvoted 22 times
...
Crnicka
Highly Voted 1 year, 7 months ago
Selected Answer: C
Key word "vector " Vectors : Direct access, Wireless, E-mail, Supply Chain, Social Media , Removable Media, Cloud
upvoted 18 times
...
Geronemo
Most Recent 1 year, 1 month ago
Selected Answer: C
When used by a malicious actor to impersonate a company, the threat vector that would appear to be the most legitimate is: C. Email. Email is a common and widely used communication channel for businesses, making it easier for malicious actors to impersonate a company and send fraudulent emails that appear legitimate. They can use techniques like email spoofing to make the emails appear to come from official company email addresses or domains. Additionally, email allows for more detailed and convincing social engineering tactics, such as requesting sensitive information or instructing recipients to take specific actions, which can further enhance the appearance of legitimacy. Therefore, email is often a preferred choice for attackers seeking to impersonate a company.
upvoted 2 times
...
russian
1 year, 1 month ago
Selected Answer: C
kinda obvious
upvoted 1 times
...
MortG7
1 year, 4 months ago
C. Email You include name of company and logos and all the relevant graphics/links..etc, and don't forget the lovely attachments.
upvoted 2 times
...
maggie22
1 year, 5 months ago
Selected Answer: C
is always E-MAIL even on the news everyday you see this. social engineering tactic, email scams and attachement, links that you thought it's legitimate, etc.
upvoted 1 times
...
[Removed]
1 year, 7 months ago
Both A and C are correct, don’t understand what comptia want !!
upvoted 9 times
Jayysaystgis
7 months, 3 weeks ago
Voice is hard to mask for a profession. Imagine getting a call from Nigeria or India saying they are the CEO of a Company. :-)
upvoted 1 times
...
...
mpengly88
1 year, 9 months ago
C. Email Email phishing is often the most legitimate appearing method used by malicious actors for impersonation. Hackers can clone official company email templates, use similar email addresses, and create a sense of urgency to trick recipients into sharing sensitive data or clicking on harmful links. Although all methods listed can be used for malicious purposes, emails often appear more formal and legitimate to the users. That's why it's important to always confirm the sender's identity and avoid clicking on suspicious links, regardless of how authentic the email seems.
upvoted 6 times
...
mpengly88
1 year, 9 months ago
Selected Answer: C
A call can’t appear legitimate, but an email can. Going with Email.
upvoted 5 times
...
touisuzuki
1 year, 9 months ago
Selected Answer: C
C. Email Email is a commonly used vector for phishing attacks and impersonation because it allows attackers to craft convincing messages that may appear to come from a legitimate company or source. Malicious actors can use various tactics, such as spoofed email addresses, convincing logos, and language that mimics official communications, to deceive recipients into believing that the email is legitimate. This can make email-based impersonation highly effective, and it's why email phishing is a prevalent method for cyberattacks.
upvoted 2 times
...
TBOY88
1 year, 9 months ago
Selected Answer: C
EMAIL is the answer
upvoted 2 times
...
henri007
1 year, 9 months ago
Selected Answer: C
C. Email Email is often used as the most legitimate threat vector for impersonating a company because it is a common and trusted communication channel for businesses. Malicious actors can craft convincing phishing emails that appear to come from a legitimate company or organization. These phishing emails may contain logos, branding, and language that closely mimic the company's official communications, making them appear highly legitimate to recipients. This is why email-based phishing attacks are a prevalent method for impersonation and social engineering attacks.
upvoted 1 times
...
sirpetey
1 year, 9 months ago
"appear to be the most legitimate" Sounds like C, since in an email you can insert logos and other details to look like an official email form the specific company. You can't appear from the company over a phone call, anyone can say they are from X and easily google the number. Instant messaging ehh, you would need to fake a profile and those are usually easily detectable. SMS, like phone call, you can google the number.
upvoted 6 times
...
geogal
1 year, 9 months ago
Selected Answer: A
Going with A too
upvoted 3 times
Yomzie
1 year, 4 months ago
How many people do you know who answer "Unknown Calls" on their phone, much less listen to the 'spammer' cajole them with fraudulent sweetness?!
upvoted 1 times
...
...
zits88
1 year, 9 months ago
Selected Answer: A
I am going to disagree with this answer and go with phone call. While a lot of companies say they won't call you, I think emails are a little bit played out at this point where many people don't fall for them at all any more, and I have yet to see one that actually appears legitimate. Willing to hear other answers though.
upvoted 8 times
GovoriLind
1 year, 9 months ago
Emails continue to be main initial vector among all vectors, going with C.
upvoted 9 times
CS3000
1 year, 9 months ago
You are indeed correct that emails are the main initial vector, however 'Most legitimate' you'll find is most associated with phone calls. There's loads of scam-hunting YouTubers that cover this!
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...