exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 165 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 165
Topic #: 1
[All 312-50v13 Questions]

An experienced cyber attacker has created a fake LinkedIn profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?

  • A. Whaling and Targeted Attacks
  • B. Pretexting and Network Vulnerability
  • C. Spear Phishing and Spam
  • D. Baiting and Involuntary Data Leakage
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
KnightHeart
1 month ago
Selected Answer: B
Identified Social Engineering Technique: The attacker impersonated a high-ranking official using a fake LinkedIn profile, targeted specific employees, and gained trust to access proprietary information. This aligns with pretexting, a technique where an attacker creates a fictional scenario (pretext) to manipulate victims into divulging sensitive data or granting access. Whaling (A) targets high-level executives, but here the attacker impersonates a high-ranking official to target others, not directly attack executives. Spear Phishing (C) involves targeted emails, but the attack uses a social media profile, not phishing emails. Baiting (D) uses physical or digital "baits" (e.g., infected USB drives), which is not the case here.
upvoted 1 times
KnightHeart
1 month ago
Immediate Threat to the Organization: The attacker gained access to proprietary project details shared within the network. This directly leads to an involuntary data leakage (D), where sensitive information is disclosed without authorization. Network Vulnerability (B) refers to flaws in infrastructure, not the immediate result of data exposure. Spam (C) is irrelevant here, as the attack focuses on data theft, not unsolicited messages. Targeted Attacks (A) are a broader category, but the immediate risk is the leakage of proprietary information, not the attack vector itself.
upvoted 1 times
...
...
e30b32d
1 month, 1 week ago
Selected Answer: A
The scenario describes an attacker: Creating a fake LinkedIn profile Impersonating a high-ranking official Gaining trust and connecting with other employees Receiving invitations and accessing sensitive project information This aligns closely with whaling, which is a type of social engineering attack that targets high-profile individuals (executives, directors, etc.) or impersonates them to gain access to privileged information or networks.
upvoted 1 times
...
[Removed]
2 months, 2 weeks ago
Selected Answer: D
Note that they asked for two things in the question: 1. Social engineering technique used(Baiting). 2.The immediate threat to the organization(Involuntary data leakage). D is the only answer that provides a social engineering threat and an immediate threat.
upvoted 1 times
...
killwitch
3 months, 2 weeks ago
Selected Answer: A
A. Whaling and Targeted Attacks This is the best match, as the attacker impersonated a high-ranking official and used this trust to gain access to proprietary project details and corporate events.
upvoted 2 times
...
Gibsomd
3 months, 2 weeks ago
Selected Answer: C
Spear Phishing → A highly targeted attack where a hacker crafts emails specifically for an individual or organization to trick them into revealing sensitive information or installing malware.
upvoted 1 times
NikoTomas
3 months, 1 week ago
Correct is A) Whaling = specific type of phishing attack that targets high-profile employees, such as the chief executive officer (CEO) or chief financial officer, in order to steal sensitive information from a company. In many whaling phishing attacks, the attacker's goal is to manipulate the victim into authorizing high-value wire transfers to the attacker. This exactly matches to the description in the question.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...