exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 192 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 192
Topic #: 1
[All 312-50v11 Questions]

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.
What is the social engineering technique Steve employed in the above scenario?

  • A. Baiting
  • B. Piggybacking
  • C. Diversion theft
  • D. Honey trap
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blacksheep6r
Highly Voted 2 years, 7 months ago
Honey Trap Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company. CEHv11 pg. 1228
upvoted 22 times
blacksheep6r
2 years, 7 months ago
Honey Trap The honey trap is a technique where an attacker targets a person online by pretending to be an attractive person and then begins a fake online relationship to obtain confidential information about the target company. In this technique, the victim is an insider who possesses critical information about the target organization.
upvoted 8 times
...
...
OleMadhatter
Highly Voted 3 years, 1 month ago
Correct Answer is D. Per EC-Council course: Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company. A Bait would be something like leaving a USB laying around or making an alluring offer of something in order to gain information.
upvoted 7 times
QuidProQuoo
3 years ago
I'd say the same... why are there so many wrong answers in these tests?
upvoted 4 times
...
...
kali7867
Most Recent 11 months, 1 week ago
The correct answer is Baiting Baiting is a type of social engineering attack or scam trick. It is the art of luring people into making poor decisions by offering them something they want and stealing information such as passwords or credit card numbers. Baiting can take many forms, including professionally crafted emails or fake social media offers. Many people have gotten into the unsafe habit of clicking on anything that interests them online. They believe things will be fine if they don't give up any information. However, just opening links runs the risk of compromising your computer. Staying vigilant and evaluating offers before interacting with them will keep you out of danger and off the hook
upvoted 1 times
...
victorfs
1 year ago
Selected Answer: D
The correcto option is D! Honey trap!!!
upvoted 1 times
...
Bob_234
1 year, 2 months ago
Selected Answer: D
A honey trap is a type of social engineering attack that involves the use of romantic or sexual enticements to gain access to sensitive information or assets. The term "honey trap" comes from the idea of luring an unsuspecting person with the sweet, irresistible appeal of honey. In this context, the attacker may pose as a potential romantic partner, using fake social media accounts, dating sites, or other communication methods to establish a relationship with the victim.
upvoted 1 times
...
Spake
1 year, 6 months ago
Selected Answer: D
honey Trap
upvoted 1 times
...
tomorrow9151
1 year, 7 months ago
Honey Trap
upvoted 1 times
...
Daniel8660
1 year, 7 months ago
Selected Answer: D
Types of Social Engineering - Human-based Social Engineering Honey Trap - an attacker targets a person online by pretending to be an attractive person and then begins a fake online relationship to obtain confidential information about the target company. In this technique, the victim is an insider who possesses critical information about the target organization. (P.1234/1218)
upvoted 3 times
...
Benoit_G
1 year, 9 months ago
Selected Answer: D
Honey Trap "Stella was enthralled by Steve's profile picture and the description given for his profile"
upvoted 1 times
...
flinux
1 year, 9 months ago
Selected Answer: D
the answer is D
upvoted 1 times
...
Fedrehopsu
1 year, 9 months ago
Selected Answer: D
It is honeytrap
upvoted 1 times
...
CHANh1990mar
1 year, 11 months ago
D for sure
upvoted 1 times
...
Scene116
2 years ago
I know that actual answer is honey trap however I believe EC-Counsel have it as baiting being the correct choice. I know it isn't right but it you want to pass the exam you have to play the game.
upvoted 1 times
...
josek19
2 years, 2 months ago
Selected Answer: D
Honey trap
upvoted 2 times
...
Amios1
2 years, 2 months ago
Honey Trap With a honey trap attack, the social engineer assumes the identity of an attractive person. They then engage in a relationship with the victim online to try to get sensitive information from them.
upvoted 1 times
...
pawel_ceh
2 years, 2 months ago
Selected Answer: D
It doesn't say he gave her a pen drive so it is not biting for sure. ;)
upvoted 3 times
...
Urltenm
2 years, 3 months ago
Honey trap: Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company.
upvoted 1 times
Urltenm
2 years, 3 months ago
Oops... it's already here)))
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...