Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 192 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 192
Topic #: 1
[All 312-50v11 Questions]

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.
What is the social engineering technique Steve employed in the above scenario?

  • A. Baiting
  • B. Piggybacking
  • C. Diversion theft
  • D. Honey trap
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
blacksheep6r
Highly Voted 2 years, 6 months ago
Honey Trap Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company. CEHv11 pg. 1228
upvoted 22 times
blacksheep6r
2 years, 6 months ago
Honey Trap The honey trap is a technique where an attacker targets a person online by pretending to be an attractive person and then begins a fake online relationship to obtain confidential information about the target company. In this technique, the victim is an insider who possesses critical information about the target organization.
upvoted 8 times
...
...
OleMadhatter
Highly Voted 3 years ago
Correct Answer is D. Per EC-Council course: Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company. A Bait would be something like leaving a USB laying around or making an alluring offer of something in order to gain information.
upvoted 7 times
QuidProQuoo
2 years, 10 months ago
I'd say the same... why are there so many wrong answers in these tests?
upvoted 4 times
...
...
kali7867
Most Recent 9 months, 3 weeks ago
The correct answer is Baiting Baiting is a type of social engineering attack or scam trick. It is the art of luring people into making poor decisions by offering them something they want and stealing information such as passwords or credit card numbers. Baiting can take many forms, including professionally crafted emails or fake social media offers. Many people have gotten into the unsafe habit of clicking on anything that interests them online. They believe things will be fine if they don't give up any information. However, just opening links runs the risk of compromising your computer. Staying vigilant and evaluating offers before interacting with them will keep you out of danger and off the hook
upvoted 1 times
...
victorfs
11 months, 2 weeks ago
Selected Answer: D
The correcto option is D! Honey trap!!!
upvoted 1 times
...
Bob_234
1 year, 1 month ago
Selected Answer: D
A honey trap is a type of social engineering attack that involves the use of romantic or sexual enticements to gain access to sensitive information or assets. The term "honey trap" comes from the idea of luring an unsuspecting person with the sweet, irresistible appeal of honey. In this context, the attacker may pose as a potential romantic partner, using fake social media accounts, dating sites, or other communication methods to establish a relationship with the victim.
upvoted 1 times
...
Spake
1 year, 5 months ago
Selected Answer: D
honey Trap
upvoted 1 times
...
tomorrow9151
1 year, 6 months ago
Honey Trap
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: D
Types of Social Engineering - Human-based Social Engineering Honey Trap - an attacker targets a person online by pretending to be an attractive person and then begins a fake online relationship to obtain confidential information about the target company. In this technique, the victim is an insider who possesses critical information about the target organization. (P.1234/1218)
upvoted 3 times
...
Benoit_G
1 year, 7 months ago
Selected Answer: D
Honey Trap "Stella was enthralled by Steve's profile picture and the description given for his profile"
upvoted 1 times
...
flinux
1 year, 7 months ago
Selected Answer: D
the answer is D
upvoted 1 times
...
Fedrehopsu
1 year, 8 months ago
Selected Answer: D
It is honeytrap
upvoted 1 times
...
CHANh1990mar
1 year, 10 months ago
D for sure
upvoted 1 times
...
Scene116
1 year, 11 months ago
I know that actual answer is honey trap however I believe EC-Counsel have it as baiting being the correct choice. I know it isn't right but it you want to pass the exam you have to play the game.
upvoted 1 times
...
josek19
2 years ago
Selected Answer: D
Honey trap
upvoted 2 times
...
Amios1
2 years, 1 month ago
Honey Trap With a honey trap attack, the social engineer assumes the identity of an attractive person. They then engage in a relationship with the victim online to try to get sensitive information from them.
upvoted 1 times
...
pawel_ceh
2 years, 1 month ago
Selected Answer: D
It doesn't say he gave her a pen drive so it is not biting for sure. ;)
upvoted 3 times
...
Urltenm
2 years, 1 month ago
Honey trap: Attackers target a person inside the company online, pretending to be an attractive person. They then begin a fake online relationship to obtain confidential information about the target company.
upvoted 1 times
Urltenm
2 years, 1 month ago
Oops... it's already here)))
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...