List of questions
Related questions
Question 550 - 312-50v12 discussion
An experienced cyber attacker has created a fake Linkedin profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?
A.
Pretexting and Network Vulnerability
B.
Spear Phishing and Spam
C.
Whaling and Targeted Attacks
D.
Baiting and Involuntary Data Leakage
Your answer:
0 comments
Sorted by
Leave a comment first