exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 507 discussion

Actual exam question from CompTIA's SY0-701
Question #: 507
Topic #: 1
[All SY0-701 Questions]

A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?

  • A. Impersonation
  • B. Replication
  • C. Phishing
  • D. Smishing
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jbmac
Highly Voted 3 months ago
Selected Answer: A
The correct answer is: A. Impersonation Explanation: Impersonation refers to an attack where a malicious actor pretends to be someone else, typically by mimicking a legitimate website, email address, or service. In this scenario, the users are accessing emails through a duplicate site that is not controlled by the company, which indicates that the attacker is impersonating the company’s legitimate email platform to deceive users.
upvoted 5 times
itsgonnabemay
1 month ago
I agree, because if they were accessing a site through emails that would be phishing--but they're accessing the emails through a duplicate site --which is impersonation.
upvoted 2 times
...
...
9149f41
Most Recent 1 month, 4 weeks ago
Selected Answer: C
The answer is not impersonation, because impersonation refers to: More about pretending to be someone Usually person-to-person deception Doesn't typically involve duplicate sites
upvoted 4 times
...
Eracle
2 months, 2 weeks ago
Selected Answer: C
Why not C: impersonation refers to pretending to be someone else, but does not necessarily imply a fake site. So, i think the correct answer is phishing
upvoted 3 times
...
9149f41
2 months, 3 weeks ago
Selected Answer: C
The correct answer is C. Phishing. Phishing involves creating a fake website or email that mimics a legitimate one to trick users into providing sensitive information, such as login credentials. In this scenario, users are accessing emails through a duplicate site that is not run by the company, which is a classic example of phishing.
upvoted 4 times
...
admcdaniel
2 months, 3 weeks ago
Selected Answer: A
Impersonation, no reference to social engineering email, text, or call. Simply a website that is impersonating another.
upvoted 4 times
...
Fhaddad81
3 months ago
Selected Answer: A
this is the explanation of Impersonation
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago