exam questions

Exam 220-1002 All Questions

View all questions & answers for the 220-1002 exam

Exam 220-1002 topic 1 question 275 discussion

Actual exam question from CompTIA's 220-1002
Question #: 275
Topic #: 1
[All 220-1002 Questions]

Which of the following attack types exploits vulnerabilities in human nature?

  • A. Zero-day
  • B. Man-in-the-middle
  • C. Spoofing
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ren758
2 years, 8 months ago
Selected Answer: D
It is definitely D
upvoted 1 times
...
sage888888888123
2 years, 11 months ago
Per Professor Dion's tests the correct answer is D phishing
upvoted 3 times
...
halloworld
2 years, 12 months ago
Selected Answer: D
C. Spoofing "Spoofing is the process of masquerading as another user or device. It is usually done for the purpose of accessing a resource to which the hacker should not have access or to get through a security device such as a firewall that may be filtering traffic based on a source IP address." D. Phishing Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as by talking to people in the organization. A social engineering attack may occur over the phone, by email, or by a visit. The intent is to acquire access information, such as user IDs and passwords. When the attempt is made through email or instant messaging, it is known as phishing and often is made to look as if it is coming from sites where users are likely to have accounts.
upvoted 1 times
...
backdooranon
3 years, 2 months ago
Both C and D are right according to FBI: https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/spoofing-and-phishing
upvoted 1 times
...
lance12
3 years, 4 months ago
Selected Answer: A
0-day uses PC vulnerabilities the rest can exploit "HUMAN VULNERABILITIES" but Phishing is takes it to next level by using "PERSONAL" information to the mix Man-in-the-middles = "PC VULNER" SPOOFING = is more on a method of delivery, Downloading malware PHISHING = Method of retrieval, asks for your credentials this is why PHISHING is the answer
upvoted 1 times
lance12
3 years, 4 months ago
I selected "A" but the answer is "D"
upvoted 2 times
...
...
OCDeeznuts
3 years, 6 months ago
?????????????
upvoted 1 times
Samsonite363
3 years, 5 months ago
Phishing is the tactic of sending hazardous links pretending to offer some service or impersonating a legitimate organization and getting the end user to click on them. All the other choices are out of control regarding end user decisions, making D the only choice that would make sense
upvoted 1 times
[Removed]
3 years, 5 months ago
spoofing exploits human trusting nature, as you pretend to be someone else. question does not make sense.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...