Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 165 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 165
Topic #: 1
[All 312-50v12 Questions]

An experienced cyber attacker has created a fake LinkedIn profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?

  • A. Whaling and Targeted Attacks
  • B. Pretexting and Network Vulnerability
  • C. Spear Phishing and Spam
  • D. Baiting and Involuntary Data Leakage
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
przemyslaw1
Highly Voted 9 months, 1 week ago
Selected Answer: B
Pretexting: Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information. CEH Module 09 - Social Engineering
upvoted 5 times
qtygbapjpesdayazko
8 months ago
This is the way
upvoted 1 times
...
misolchang
9 months ago
I think this is right.
upvoted 1 times
...
...
F4ll3n92
Most Recent 2 months ago
Selected Answer: A
in the scenario described, aren't things referred of a network vulnerability, so, i think that the correct answer is A
upvoted 1 times
...
ametah
5 months ago
Selected Answer: A
Pretexting Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information. CEHv12 Module 09 Page 1386
upvoted 1 times
ametah
5 months ago
Moderator please correct the vote to B.
upvoted 1 times
...
...
rawal_
5 months, 1 week ago
Selected Answer: A
Why Option A (Whaling and Targeted Attacks) is Correct: Impersonation of a high-ranking official: The attacker posed as a senior executive on LinkedIn, which is a typical tactic in whaling attacks where high-profile individuals are impersonated to gain credibility and manipulate targets. Access to proprietary project details: By connecting with employees and gaining access to exclusive corporate events, the attacker successfully obtained sensitive information, demonstrating a targeted attack focused on acquiring valuable corporate data. Therefore, option A (Whaling and Targeted Attacks) best describes the advanced social engineering technique used by the attacker and identifies the most likely immediate threat to the organization
upvoted 2 times
...
LordXander
8 months ago
Selected Answer: A
So, in this context, A & B are strong contenders. A - seems more precies B - has that pretexting definition by the book However, Pretexting is part of Whaling and in the question be have nothing about Network Vulnerability but be have about a targeted Attack. So the final answer, and correct one, is A
upvoted 1 times
...
qtygbapjpesdayazko
8 months ago
Selected Answer: B
Keyword "impersonating a high-ranking official" (Pretexting) not targeting CEOs (Whaling). From the book "Pretexting Fraudsters may impersonate executives from financial institutions"
upvoted 2 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: A
A - Whaling - Key word "high-ranking official"
upvoted 2 times
qtygbapjpesdayazko
8 months ago
Is not A is Pretexting.
upvoted 1 times
...
...
Spam_Protection
8 months, 2 weeks ago
Selected Answer: B
Pretexting Fraudsters may impersonate executives from financial institutions, telephone companies, and other businesses. They rely on “smooth-talking” and win the trust of an individual to reveal sensitive information.
upvoted 2 times
...
dobarb
8 months, 2 weeks ago
B. CEH 1386 key word is impresonate
upvoted 1 times
...
kennels
9 months ago
Selected Answer: B
I think this comment is right. > Pretexting: Fraudsters may~(przemyslaw1)
upvoted 2 times
...
brrbrr
9 months ago
Selected Answer: A
Key words is "high-ranking official". then the most likely immediate threat to the organization is targeted attacks.
upvoted 3 times
...
JustAName
9 months, 2 weeks ago
Selected Answer: C
I would choose C, should not be A because the person impersonate high-ranking official, not targeting high-ranking official.
upvoted 1 times
...
multivolt
9 months, 2 weeks ago
Im unsure about the accuracy of this statement
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: A
A. Whaling and Targeted Attacks Whaling = An attacker targets high profile executives like CEOs, CFOs, politicians, and celebrities who have complete access to confidential and highly valuable information.The attacker tricks the victim into revealing critical corporate and personal information through email or website spoofing
upvoted 4 times
JustAName
9 months, 2 weeks ago
Here's is my thought. The attacker impersonate as High-level executives, not targeting high-level executives. The attacker then target the rest of the employees, so i think whaling might not be the right answer.
upvoted 3 times
JustAName
9 months, 2 weeks ago
actually, whaling and targeted attacks might be the closest answer here. Attacker impersonate as high-level execs and get access to only exclusive corporate events.
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...