exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 258 discussion

Actual exam question from Cisco's 200-201
Question #: 258
Topic #: 1
[All 200-201 Questions]

What is a description of "phishing" as a social engineering attack?

  • A. Fake Social Security Administration personnel contact random individuals, inform them that there has been a computer problem on their end, and ask that those individuals confirm their Social Security Number, all for the purpose of committing identity theft.
  • B. A hacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link.
  • C. The attacker focuses on creating a good pretext, or a fabricated scenario, that is used to try and steal victims' personal information.
  • D. Someone without the proper authentication follows an authenticated employee into a restricted area. The attacker might impersonate a delivery driver and wait outside a building to get things started.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sheyshey
6 days ago
Selected Answer: B
answer is B, why? because A is "vishing" like they mentioned down on the comment section
upvoted 1 times
...
macxwhale
5 months, 1 week ago
NIST 800-86 Page 5-3 describes free space at https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf
upvoted 1 times
...
drdecker100
10 months, 1 week ago
Selected Answer: B
This answer accurately describes the basic principle of a phishing attack as a social engineering attack. Phishing attacks typically involve the attacker posing as a trustworthy entity, such as a bank, government agency, or well-known company, to trick the victim into revealing sensitive information, such as login credentials, financial information, or personal details. The attacker achieves this by sending an email or message with a link that appears to be legitimate, but in fact leads to a fake website designed to steal the victim's information. In this way, phishing attacks can be used to steal sensitive information and commit fraud or identity theft.
upvoted 4 times
...
weganos
11 months ago
Why not A? I would say both are forms of Phishing.
upvoted 2 times
mozaki
9 months ago
A. vishing
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago