ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 547 - SY0-601 discussion

Report
Export

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

A.
Phone call
Answers
A.
Phone call
B.
Instant message
Answers
B.
Instant message
C.
Email
Answers
C.
Email
D.
Text message
Answers
D.
Text message
Suggested answer: C

Explanation:

Email is one of the most common and effective threat vectors used by malicious actors to impersonate a company and conduct phishing or spear phishing attacks. Phishing is a type of social engineering attack where an attacker sends fraudulent emails that appear to be from a legitimate source, such as a company, a bank, a government agency, etc., and tries to trick the recipients into clicking on malicious links, opening malicious attachments, or providing sensitive information. Email can appear to be more legitimate than other threat vectors because it can use spoofed sender addresses, logos, signatures, or domain names that resemble the real ones.

asked 02/10/2024
Kurt Onal
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first