exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 84 discussion

Actual exam question from Cisco's 200-201
Question #: 84
Topic #: 1
[All 200-201 Questions]

What are two social engineering techniques? (Choose two.)

  • A. privilege escalation
  • B. DDoS attack
  • C. phishing
  • D. man-in-the-middle
  • E. pharming
Show Suggested Answer Hide Answer
Suggested Answer: CE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
anonymous1966
Highly Voted 2 years, 1 month ago
From the book: Other social engineering techniques include the following: Phishing, Spear phishing, Pharming (is the term used to describe a threat actor redirecting a victim from a valid website or resource to a malicious one that could be made to appear as the valid site to the user. From there, an attempt is made to extract confidential information from the user or to install malware in the victim’s system. Pharming can be done by altering the host file on a victim’s system, through DNS poisoning, or by exploiting a vulnerability in a DNS server.), Malvertising, SMS phishing, Voice phishing (or vishing), Whaling, Elicitation, interrogation, and impersonation (Pretexting)
upvoted 6 times
...
drdecker100
Most Recent 8 months, 1 week ago
Selected Answer: CE
C. phishing - Phishing is the practice of sending emails or messages to deceive individuals into providing sensitive information such as usernames, passwords, and credit card details. E. pharming - Pharming is a type of cyber attack where an attacker redirects website traffic from a legitimate website to a fraudulent website that looks similar to the legitimate one, with the aim of stealing personal or financial information.
upvoted 1 times
...
fyticez
1 year ago
Not actually clear why the book considers Pharming as a social engineering type of attack (threat actor doesn't need to communicate with the victim), since it's actually more of an end-point(workstation/server/online dns resolver) based attack revolving around the manipulation of DNS entries...
upvoted 1 times
...
Eng_ahmedyoussef
1 year ago
Selected Answer: CE
C. phishing (Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website) E. pharming (Pharming is a form of online fraud involving malicious code and fraudulent websites. Cybercriminals install malicious code on your computer or server. The code automatically directs you to bogus websites without your knowledge or consent)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago