Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 630 discussion

Actual exam question from CompTIA's SY0-601
Question #: 630
Topic #: 1
[All SY0-601 Questions]

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

  • A. Phone call
  • B. Instant message
  • C. Email
  • D. Text message
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
subaie503
Highly Voted 2 months, 1 week ago
Real world: A CompTIA world: C
upvoted 14 times
...
Crnicka
Highly Voted 5 months, 2 weeks ago
Selected Answer: C
Key word "vector " Vectors : Direct access, Wireless, E-mail, Supply Chain, Social Media , Removable Media, Cloud
upvoted 13 times
...
Geronemo
Most Recent 1 week, 1 day ago
Selected Answer: C
When used by a malicious actor to impersonate a company, the threat vector that would appear to be the most legitimate is: C. Email. Email is a common and widely used communication channel for businesses, making it easier for malicious actors to impersonate a company and send fraudulent emails that appear legitimate. They can use techniques like email spoofing to make the emails appear to come from official company email addresses or domains. Additionally, email allows for more detailed and convincing social engineering tactics, such as requesting sensitive information or instructing recipients to take specific actions, which can further enhance the appearance of legitimacy. Therefore, email is often a preferred choice for attackers seeking to impersonate a company.
upvoted 2 times
...
russian
1 week, 3 days ago
Selected Answer: C
kinda obvious
upvoted 1 times
...
MortG7
3 months, 1 week ago
C. Email You include name of company and logos and all the relevant graphics/links..etc, and don't forget the lovely attachments.
upvoted 1 times
...
maggie22
3 months, 2 weeks ago
Selected Answer: C
is always E-MAIL even on the news everyday you see this. social engineering tactic, email scams and attachement, links that you thought it's legitimate, etc.
upvoted 1 times
...
COPLVL
6 months ago
Both A and C are correct, don’t understand what comptia want !!
upvoted 8 times
...
mpengly88
7 months, 2 weeks ago
C. Email Email phishing is often the most legitimate appearing method used by malicious actors for impersonation. Hackers can clone official company email templates, use similar email addresses, and create a sense of urgency to trick recipients into sharing sensitive data or clicking on harmful links. Although all methods listed can be used for malicious purposes, emails often appear more formal and legitimate to the users. That's why it's important to always confirm the sender's identity and avoid clicking on suspicious links, regardless of how authentic the email seems.
upvoted 6 times
...
mpengly88
7 months, 3 weeks ago
Selected Answer: C
A call can’t appear legitimate, but an email can. Going with Email.
upvoted 5 times
...
touisuzuki
7 months, 3 weeks ago
Selected Answer: C
C. Email Email is a commonly used vector for phishing attacks and impersonation because it allows attackers to craft convincing messages that may appear to come from a legitimate company or source. Malicious actors can use various tactics, such as spoofed email addresses, convincing logos, and language that mimics official communications, to deceive recipients into believing that the email is legitimate. This can make email-based impersonation highly effective, and it's why email phishing is a prevalent method for cyberattacks.
upvoted 2 times
...
TBOY88
7 months, 3 weeks ago
Selected Answer: C
EMAIL is the answer
upvoted 2 times
...
henri007
7 months, 3 weeks ago
Selected Answer: C
C. Email Email is often used as the most legitimate threat vector for impersonating a company because it is a common and trusted communication channel for businesses. Malicious actors can craft convincing phishing emails that appear to come from a legitimate company or organization. These phishing emails may contain logos, branding, and language that closely mimic the company's official communications, making them appear highly legitimate to recipients. This is why email-based phishing attacks are a prevalent method for impersonation and social engineering attacks.
upvoted 1 times
...
sirpetey
8 months ago
"appear to be the most legitimate" Sounds like C, since in an email you can insert logos and other details to look like an official email form the specific company. You can't appear from the company over a phone call, anyone can say they are from X and easily google the number. Instant messaging ehh, you would need to fake a profile and those are usually easily detectable. SMS, like phone call, you can google the number.
upvoted 6 times
...
geogal
8 months ago
Selected Answer: A
Going with A too
upvoted 3 times
Yomzie
3 months, 1 week ago
How many people do you know who answer "Unknown Calls" on their phone, much less listen to the 'spammer' cajole them with fraudulent sweetness?!
upvoted 1 times
...
...
zits88
8 months, 1 week ago
Selected Answer: A
I am going to disagree with this answer and go with phone call. While a lot of companies say they won't call you, I think emails are a little bit played out at this point where many people don't fall for them at all any more, and I have yet to see one that actually appears legitimate. Willing to hear other answers though.
upvoted 8 times
GovoriLind
8 months ago
Emails continue to be main initial vector among all vectors, going with C.
upvoted 8 times
CS3000
8 months ago
You are indeed correct that emails are the main initial vector, however 'Most legitimate' you'll find is most associated with phone calls. There's loads of scam-hunting YouTubers that cover this!
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...