exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 226 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 226
Topic #: 1
[All 312-50v11 Questions]

Sam, a professional hacker, targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS IAM credentials and further compromise the employee's account.
What is the technique used by Sam to compromise the AWS IAM credentials?

  • A. Insider threat
  • B. Social engineering
  • C. Password reuse
  • D. Reverse engineering
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Genesis777
6 months, 1 week ago
Social engineering is the correct answer. Reverse engineering is the process of analyzing and extracting the source code of a software or application and, if needed, regenerating it with required modifications.
upvoted 1 times
...
Daniel8660
7 months, 3 weeks ago
Selected Answer: B
Pretends to be legitimate or an authorized person, and send an legitimate email acquire user account information.
upvoted 3 times
...
4everdzc9
1 year ago
D REVERSE ENGEENERING
upvoted 1 times
dinonino
8 months, 3 weeks ago
social engineering
upvoted 2 times
...
...
ANDRESCB1988
1 year, 10 months ago
correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...