exam questions

Exam 220-1002 All Questions

View all questions & answers for the 220-1002 exam

Exam 220-1002 topic 1 question 9 discussion

Actual exam question from CompTIA's 220-1002
Question #: 9
Topic #: 1
[All 220-1002 Questions]

Which of the following threats uses personalized information in an attempt at obtaining information?

  • A. Whaling
  • B. Impersonation
  • C. Spoofing
  • D. Spear phishing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MelvinJohn
Highly Voted 4 years, 4 months ago
D spear fishing Note: Took and passed the Core2 exam today. Only about 20% of all the sample test questions were on my exam. Had 77 questions for 90 minutes (about 1:20 per question). Had to go slow because I had to think hard about each of the 55 or so questions I'd never seen before. Didn't have time to answer every question. Exam ended and I had 4 questions unanswered. Ran out of time. Be sure not to pause too long to ponder correct answer.
upvoted 14 times
RekonCIS
4 years, 3 months ago
DONT TRUST THIS GUY!!!!....He gave all the wrong answers in Security + discussions. Must be a CompTIA infiltrator
upvoted 29 times
...
...
Ty_ty
Highly Voted 4 years, 3 months ago
bro, this question is trash
upvoted 9 times
TomTK
3 years, 7 months ago
I find most of these questions to be gotcha's. Its not like maths where the answer is clear, they're so vague and can apply to more than one answer
upvoted 3 times
...
...
clmxr16
Most Recent 3 months, 1 week ago
Selected Answer: D
this question is to broad for the answers, they all are used to obtain personal information i would eliminate A since it didnt mention any high profile individual, B also is no since it say anything about pretending to be someone to obtain information, C is just faking information to obtain information so answer is D
upvoted 1 times
...
UGotThis
3 years, 5 months ago
Selected Answer: D
the question focuses on "threats using personalized info in an attempt to obtain info"- the answer should be D- spear phishing Whaling - is a narrow attack on higher ups of a corporation like CEO's- which possibly can be true Impersonation - this is someone that is trying to trick you to perform something for them, like a Microsoft agent- giving them access to your computer spoofing- an example of this is tricking someone in believing a website or phone number is legit when it is not, it is not trying to use "personalized info" to obtain info. Spear Phishing is an attempt to do research on you (using personalized information) in an attempt to obtain info. per Professor Messer: "They’re going after a very specific person or very specific group of people to be able to gather the information that they need"-which is 100% true
upvoted 6 times
...
_Anas
3 years, 6 months ago
Phishing > Spear phishing > Whaling (Whaling) is a specific type of (spear phishing), targets high ranking victims within a company. (spear phishing) is a specific type of (phishing), that target individuals. (phishing) a term that covers any type of attack that try to fool a victim into taking som action and it does not have a specific traget. Source : https://searchsecurity.techtarget.com/
upvoted 7 times
...
_Anas
3 years, 6 months ago
Phishing > Spear phishing > Whaling (Whaling) is a specific type of (spear phishing), (spear phishing) is a specific type of (phishing). (phishing) a term that covers any type of attack that try to fool a victim into taking som action and it does not have a specific traget. Source : https://searchsecurity.techtarget.com/
upvoted 1 times
...
SamuelSami
3 years, 7 months ago
The difference between them is primarily a matter of targeting. Phishing emails are sent to very large numbers of recipients, more or less at random, with the expectation that only a small percentage will respond. ... Spear phishing emails are carefully designed to get a single recipient to respond.
upvoted 1 times
...
MindyTeflon
3 years, 8 months ago
personalized information of the victim is used in both impersonation and spoofing, the issue that makes these not to be the exact answers is their next purpose is attack not to gain more information. In spear phishing one may pretend to be a ligitimate sender and also may use the victim's personal information inorder to convince to get more information. Thus I finaly incline to choose D.
upvoted 1 times
...
OCD
4 years ago
In the case of spear phishing, the source of the email is likely to be an individual within the recipient's own company -- generally, someone in a position of authority -- or from someone the target knows personally.
upvoted 3 times
...
Ssultan
4 years, 1 month ago
Stolen personal information can be used to harm companies In addition to the personal problems stolen data can cause, it can also damage companies. With stolen data criminals can target company personnel to give sensitive information or to trick them to make payments. Such phishing attacks targeted against a specific individual are called spear-phishing. Criminals can also try to gain access to company networks to spy on them and infect them with malware.
upvoted 1 times
...
izzyHTX
4 years, 6 months ago
this is correct. Whaling is for CEO type upper management.
upvoted 1 times
...
Villy
4 years, 9 months ago
Its "personalized" assumes that they know info about you
upvoted 1 times
...
licia
4 years, 9 months ago
id go with spear phishing, "threat"
upvoted 1 times
...
betty_boop
4 years, 9 months ago
I thought it could be impersonation also, but I'm leaning more towards "spear phishing" now. It can't be whaling tho. This is from Prof. Messer's notes: Spear phishing • Phishing with inside information • Makes the attack more believable • Spear phishing the CEO is “whaling”
upvoted 3 times
...
eldaulo
4 years, 11 months ago
Spear and Whale phishing is using a user's information to obtain more information. BUT it is an attack, that uses spoofing techniques. The attacker already has some information about you, and it is personalized towards you. Phishing - Obtaining user authentication or financial information through a fraudulent request for information. Phishing is specifically associated with emailing users with a link to a fake site (or some other malware that steals information they use to try to authenticate). Whaling - A form of phishing that targets individuals who are known or are believed to be wealthy. Spoofing - Where the attacker disguises their identity. Some examples include IP spoofing where the attacker changes their IP address or phishing where the attacker sets up a false website.
upvoted 3 times
...
shangus
5 years, 2 months ago
its neither of them its actually spoofing because its using personalized information to become someone they are not in order to get information
upvoted 3 times
Street_Rossi
5 years, 2 months ago
I believe spear fishing is correct because it is "an attempt to obtaining information".
upvoted 1 times
...
SkyShark
5 years, 1 month ago
I understand your logic, but in the question it states "threat", spoofing is an actual attack and not a threat.
upvoted 4 times
...
...
156748918635135
5 years, 5 months ago
A - Whaling is personalized https://blog.emsisoft.com/en/32736/phishing-vs-spear-phishing-vs-whaling-attacks/
upvoted 2 times
Tzu
5 years, 4 months ago
Whaling targets big shots, spear phishing targets small fry.
upvoted 11 times
...
Anon6606
4 years, 7 months ago
whaling is high profile targets
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago