exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 772 discussion

Actual exam question from CompTIA's SY0-501
Question #: 772
Topic #: 1
[All SY0-501 Questions]

An attacker has gathered information about a company employee by obtaining publicly available information from the Internet and social networks. Which of the following types of activity is the attacker performing?

  • A. Pivoting
  • B. Exfiltration of data
  • C. Social engineering
  • D. Passive reconnaissance
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nubian
4 years, 1 month ago
Passive Reconnaissance is the right answer. https://www.itpro.com/penetration-testing/34465/whats-the-difference-between-active-and-passive-reconnaissance Social Engineering involves engaging the target.
upvoted 1 times
...
Born_Again
4 years, 2 months ago
From Professor Messer: Passive reconnaissance • Learn as much as you can from open sources • There’s a lot of information out there • Remarkably difficult to protect or identify • Social media • Corporate web site, online forums, Reddit • Social engineering, dumpster diving • Business organizations
upvoted 1 times
...
Born_Again
4 years, 2 months ago
From Professor Messer Notes: Supply chain • September 2015: Hundreds of Cisco routers infected with “SYNful Knock” • Firmware modified for back-door access • Can you trust your new server/router/switch/firewall? • Supply chain cyber security • Use trusted vendors • Critical devices should not be connected to the outside • Verify your hardware is genuine
upvoted 1 times
...
AlexChen011
4 years, 4 months ago
REMEMBER social engineering involves [interaction] with people
upvoted 3 times
...
Hanzero
4 years, 10 months ago
Are you guys kidding me? How is this social engineering? The attacker is on public websites looking for info without a direct form of communication with anyone.
upvoted 4 times
...
Varus
4 years, 10 months ago
Its passive because the attacker didn't call the company to get passwords or some other access. He is merely getting from online sources. Company webpages and all that.
upvoted 3 times
...
Qkz
5 years ago
already done social engineering.
upvoted 1 times
...
hotm
5 years ago
Not social engineering?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...