exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 686 discussion

Actual exam question from CompTIA's SY0-601
Question #: 686
Topic #: 1
[All SY0-601 Questions]

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

  • A. Smishing
  • B. Phishing
  • C. Impersonating
  • D. Vishing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DashRyde
Highly Voted 1 year, 9 months ago
Selected Answer: D
While "C. Impersonating" is indeed part of the attacker's actions, it's a more generic term for assuming someone else's identity. In this specific scenario, the attacker is using vishing (voice phishing) to impersonate the Chief Executive Officer (CEO) over the phone, which is a type of social engineering attack where the voice is used to manipulate the employee into buying gift cards. So, "D. Vishing" more accurately describes the specific technique being employed in this situation.
upvoted 14 times
...
Cisco103
Highly Voted 1 year, 9 months ago
Impersonation is correct, don't overthinking
upvoted 9 times
memodrums
1 year, 4 months ago
what vector did the attacker use to impersonate though?
upvoted 2 times
31f71c4
1 year, 1 month ago
The attacker used vishing as the vector to impersonate to get his giftcards
upvoted 2 times
...
...
...
JasonMunoz
Most Recent 11 months, 3 weeks ago
Selected Answer: D
My first thought was C, impersonating, but the attack was done over the phone, so Vishing, would take precedence. If this attack was done through written communication like text or email, then it would fall under impersonation.
upvoted 1 times
...
xBrynlee
1 year ago
Selected Answer: C
COMPTIA Study Guide says: Impersonation simply means pretending to be someone else. It is one of the basic social engineering techniques. Impersonation can use either a consensus/liking or intimidating approach. Impersonation is possible where the target cannot verify the attacker's identity easily, such as over the phone or via an email message.
upvoted 1 times
...
shady23
1 year, 2 months ago
HOW ABOUT THIS QUESTION GUYS ?? An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using? A. Smishing B. Disinformation C. Impersonating D. Whaling
upvoted 1 times
jerseydude
1 year, 1 month ago
This would be Impersonating. If Vishing was an option it would be Vishing. Similar to the UPS vs Generator Questions.
upvoted 3 times
...
...
durel
1 year, 2 months ago
Selected Answer: D
CEO fraud: Typically perpetrated through email or electronic communication, with the attacker impersonating a high-ranking executive. Vishing: Involves voice communication, such as phone calls, with the attacker impersonating someone from a trusted organization.
upvoted 1 times
...
AbdullahMohammad251
1 year, 2 months ago
Selected Answer: C
The correct answer is whaling. Whaling is a phishing attack that targets high-profile people by impersonating them. The answer is not listed here but listed in my dump! The best option would be C
upvoted 1 times
...
Geronemo
1 year, 2 months ago
Selected Answer: D
Vishing, short for "voice phishing," is a social engineering technique in which attackers use phone calls to trick individuals into providing sensitive information or taking unauthorized actions. In this case, the attacker is using a phone call to impersonate the CEO and manipulate the employee into purchasing gift cards, which is a common tactic in vishing attacks.
upvoted 1 times
...
mikzer
1 year, 3 months ago
Selected Answer: C
The technique is impersonation, the attack method is Vishing which seeks credentials or personal info. In most all cases, both are used together.
upvoted 1 times
...
5e7a5bb
1 year, 3 months ago
The keyword is call - vishing
upvoted 3 times
...
ekiel
1 year, 4 months ago
Selected Answer: D
the technique is the attacker using is Vishing
upvoted 1 times
...
subaie503
1 year, 4 months ago
At first I thought Vishing, but he isn't trying to phish any credentials from him, only extortion.
upvoted 2 times
subaie503
1 year, 4 months ago
I guess vishing is still technically viable, another coinflip question..
upvoted 2 times
6de42b3
1 year, 2 months ago
If you think about it vishing almost always uses a form of impersonation. I mean what other tactic could you use with vishing. You call someone and you claim to be an IT support, CEO, etc. These are the methods that vishing is using to get the victim, but the attack at the base is vishing.
upvoted 1 times
...
...
...
TM78
1 year, 4 months ago
Selected Answer: C
C. Impersonating (or impersonation) An impersonation attack uses vishing as a form of attack. If the phone call was just a vishing attack, I don’t think the question would have included the CEO.
upvoted 1 times
...
hyabasa
1 year, 5 months ago
Seems like it can be either C or D... My question, how precise and evil is Comptia?? If you look at the objectives for this exam, 1.1 includes both Vishing and Impersonation... see that second word "Impersonation"... NOT "Impersonating". So, if they are trying to fool you into picking the wrong one, seems like spelling "Impersonating" as they did could be the "trick" they are playing on us. I'm going to Vishing, though I will admit, I am not positive. But, I don't trust Comptia. They are assholes that write those questions!
upvoted 6 times
...
Petercx
1 year, 7 months ago
Selected Answer: D
The attacker is using Option D: Vishing. Vishing, or voice phishing, is a form of social engineering where an attacker uses the telephone system to trick the victim into providing private information. In this case, the attacker is posing as the Chief Executive Officer and instructing the employee to buy gift cards, which is a common tactic used in vishing attacks.
upvoted 4 times
HCM1985
1 year, 3 months ago
But he's not going for private info, just for the victim to spend money
upvoted 1 times
...
...
konami007
1 year, 8 months ago
Selected Answer: D
The attacker is using D. Vishing. Vishing is a type of social engineering attack where the attacker uses the phone to pose as a legitimate entity and trick the victim into revealing sensitive information or performing certain actions. In this case, the attacker is posing as the CEO and instructing the employee to buy gift cards.
upvoted 3 times
...
Yarzo
1 year, 8 months ago
Selected Answer: D
The attacker in this scenario is using "Vishing" (Option D). Vishing stands for "voice phishing," and it involves a social engineering attack where an attacker makes phone calls, impersonates someone they are not, and tries to manipulate the victim into revealing sensitive information or taking specific actions, such as purchasing gift cards. In this case, the attacker is posing as the CEO and attempting to trick the employee over the phone.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...