exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 165 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 165
Topic #: 1
[All 312-50v12 Questions]

An experienced cyber attacker has created a fake LinkedIn profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?

  • A. Whaling and Targeted Attacks
  • B. Pretexting and Network Vulnerability
  • C. Spear Phishing and Spam
  • D. Baiting and Involuntary Data Leakage
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
przemyslaw1
Highly Voted 1 year, 1 month ago
Selected Answer: B
Pretexting: Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information. CEH Module 09 - Social Engineering
upvoted 5 times
This is the way
upvoted 1 times
...
misolchang
1 year, 1 month ago
I think this is right.
upvoted 1 times
...
...
blehbleh
Most Recent 4 months ago
Selected Answer: A
This is A, it is asking which advanced social engineering technique the attacker used. He didn't use baiting, spear phishing, or network vulnerabilities. He used whaling and targeted attacks. Literally, read the last part of the question.
upvoted 1 times
...
d02c2d5
4 months, 1 week ago
Selected Answer: D
For me id D the fake linkedin profile lure other to invite the haker. Furthermore the haker has critical data that could point to Data Leakage
upvoted 1 times
...
F4ll3n92
6 months, 1 week ago
Selected Answer: A
in the scenario described, aren't things referred of a network vulnerability, so, i think that the correct answer is A
upvoted 1 times
...
ametah
9 months, 2 weeks ago
Selected Answer: A
Pretexting Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information. CEHv12 Module 09 Page 1386
upvoted 1 times
ametah
9 months, 2 weeks ago
Moderator please correct the vote to B.
upvoted 1 times
...
...
rawal_
9 months, 2 weeks ago
Selected Answer: A
Why Option A (Whaling and Targeted Attacks) is Correct: Impersonation of a high-ranking official: The attacker posed as a senior executive on LinkedIn, which is a typical tactic in whaling attacks where high-profile individuals are impersonated to gain credibility and manipulate targets. Access to proprietary project details: By connecting with employees and gaining access to exclusive corporate events, the attacker successfully obtained sensitive information, demonstrating a targeted attack focused on acquiring valuable corporate data. Therefore, option A (Whaling and Targeted Attacks) best describes the advanced social engineering technique used by the attacker and identifies the most likely immediate threat to the organization
upvoted 2 times
...
LordXander
1 year ago
Selected Answer: A
So, in this context, A & B are strong contenders. A - seems more precies B - has that pretexting definition by the book However, Pretexting is part of Whaling and in the question be have nothing about Network Vulnerability but be have about a targeted Attack. So the final answer, and correct one, is A
upvoted 1 times
...
Selected Answer: B
Keyword "impersonating a high-ranking official" (Pretexting) not targeting CEOs (Whaling). From the book "Pretexting Fraudsters may impersonate executives from financial institutions"
upvoted 2 times
...
Selected Answer: A
A - Whaling - Key word "high-ranking official"
upvoted 2 times
Is not A is Pretexting.
upvoted 1 times
...
...
Spam_Protection
1 year ago
Selected Answer: B
Pretexting Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information.
upvoted 2 times
...
dobarb
1 year ago
B. CEH 1386 key word is impresonate
upvoted 1 times
...
kennels
1 year, 1 month ago
Selected Answer: B
I think this comment is right. > Pretexting: Fraudsters may~(przemyslaw1)
upvoted 2 times
...
brrbrr
1 year, 1 month ago
Selected Answer: A
Key words is "high-ranking official". then the most likely immediate threat to the organization is targeted attacks.
upvoted 3 times
...
JustAName
1 year, 1 month ago
Selected Answer: C
I would choose C, should not be A because the person impersonate high-ranking official, not targeting high-ranking official.
upvoted 1 times
...
multivolt
1 year, 1 month ago
Im unsure about the accuracy of this statement
upvoted 1 times
...
insaniunt
1 year, 1 month ago
Selected Answer: A
A. Whaling and Targeted Attacks Whaling = An attacker targets high profile executives like CEOs, CFOs, politicians, and celebrities who have complete access to confidential and highly valuable information.The attacker tricks the victim into revealing critical corporate and personal information through email or website spoofing
upvoted 4 times
JustAName
1 year, 1 month ago
Here's is my thought. The attacker impersonate as High-level executives, not targeting high-level executives. The attacker then target the rest of the employees, so i think whaling might not be the right answer.
upvoted 3 times
JustAName
1 year, 1 month ago
actually, whaling and targeted attacks might be the closest answer here. Attacker impersonate as high-level execs and get access to only exclusive corporate events.
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago