Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 70 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 70
Topic #: 1
[All 312-50v11 Questions]

Which of the following is a low-tech way of gaining unauthorized access to systems?

  • A. Social Engineering
  • B. Eavesdropping
  • C. Scanning
  • D. Sniffing
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kidneysmasher
Highly Voted 2 years, 11 months ago
Correct Answer: A Explanation/Reference: Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access. References: https://en.wikipedia.org/wiki/Social_engineering_(security)
upvoted 15 times
...
ostorgaf
Most Recent 7 months, 1 week ago
Selected Answer: A
Social engineering is a technique that relies on manipulating individuals into divulging confidential information or performing actions that compromise the security of a system. It often involves psychological manipulation and deception to trick people into revealing sensitive information, such as passwords or access credentials. It is considered a low-tech method because it doesn't rely on sophisticated technical skills but rather exploits human psychology and trust.
upvoted 1 times
...
awesomeduck
11 months, 4 weeks ago
Selected Answer: A
Compared to eavesdropping, social engineering can be low tech in most cases.
upvoted 1 times
...
noblethic
1 year, 2 months ago
Selected Answer: A
Social Engineering is correct. Eavesdropping requires no technology at all in most cases.
upvoted 4 times
...
josevirtual
1 year, 3 months ago
Selected Answer: A
Everywhere I found information, including the courseware, it refers to interception of comunication between 2 devices. P. 1232: "Eavesdropping refers to an unauthorized person listening to a conversation or reading others’ messages. It includes the interception of any form of communication, including audio, video, or written, using channels such as telephone lines, email, and instant messaging. An attacker can obtain sensitive information such as passwords, business plans, phone numbers, and addresses." https://www.fortinet.com/resources/cyberglossary/eavesdropping https://www.investopedia.com/terms/e/eavesdropping-attack.asp https://www.sangfor.com/glossary/cybersecurity/what-is-eavesdropping-attack-and-how-does-it-work
upvoted 2 times
...
OyorQSEC
1 year, 3 months ago
Selected Answer: B
Voted B. Most of social engineering techniques need mid/high skills to GAIN ACCESS. For me the key is here. Eavesdropping is considered as a low-tech skill.
upvoted 2 times
...
Famous_Guy
1 year, 4 months ago
Selected Answer: A
IT'S A
upvoted 1 times
...
Daniel8660
1 year, 5 months ago
Selected Answer: B
Types of Social Engineering Human-based Social Engineering Eavesdropping - Unauthorized listening of conversations, or reading of messages. (P.1227)
upvoted 1 times
...
Isharafaz
1 year, 6 months ago
Answer is A - key is low tech way, which is social engineering.
upvoted 1 times
...
astaroth
1 year, 7 months ago
Selected Answer: A
Anyone with social skills can perform this type of attack
upvoted 1 times
...
uday1985
1 year, 9 months ago
so social engineering is low tech? getting the payload? finding the vulnerability to exploit? reconn? what the ?
upvoted 1 times
...
ronxz
1 year, 9 months ago
Selected Answer: A
Social engineering is the art of manipulating people to divulge sensitive information to use it to perform some malicious action. (p. 1201) Eavesdropping refers to an unauthorized person listening to a conversation or reading others’ messages. It includes the interception of any form of communication, including audio, video, or written, using channels such as telephone lines, email, and instant messaging. (p. 1216)
upvoted 1 times
...
mdmdmd
1 year, 10 months ago
was actually leaning towards B, but A might be right
upvoted 2 times
Forrest43
8 months, 2 weeks ago
both are correct in my opinion. Eavesdropping can be non-technical. The question is not specific enough. If my students would get a question like this, they would sew me :-)
upvoted 1 times
...
...
RottenCow21
1 year, 11 months ago
Selected Answer: A
A is correct
upvoted 1 times
...
cazzobsb
1 year, 11 months ago
Selected Answer: A
correct
upvoted 1 times
...
pawel_ceh
2 years ago
Selected Answer: A
Definitely A.
upvoted 1 times
...
spydog
2 years, 1 month ago
Selected Answer: B
Eavesdropping is not MITM...That is sniffing. Eavesdropping is to listen someone conversation in real life - peoples conversations. I has nothing to do with network it any IT related. It has to be B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...