Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 70 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 70
Topic #: 1
[All 312-50v11 Questions]

Which of the following is a low-tech way of gaining unauthorized access to systems?

  • A. Social Engineering
  • B. Eavesdropping
  • C. Scanning
  • D. Sniffing
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kidneysmasher
Highly Voted 3 years, 7 months ago
Correct Answer: A Explanation/Reference: Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access. References: https://en.wikipedia.org/wiki/Social_engineering_(security)
upvoted 15 times
...
noblethic
Highly Voted 1 year, 10 months ago
Selected Answer: A
Social Engineering is correct. Eavesdropping requires no technology at all in most cases.
upvoted 5 times
...
KRZJ
Most Recent 3 weeks, 1 day ago
Selected Answer: B
For me B Eavesdropping still requires some technical skills to know how to use the heard information
upvoted 1 times
...
ostorgaf
1 year, 2 months ago
Selected Answer: A
Social engineering is a technique that relies on manipulating individuals into divulging confidential information or performing actions that compromise the security of a system. It often involves psychological manipulation and deception to trick people into revealing sensitive information, such as passwords or access credentials. It is considered a low-tech method because it doesn't rely on sophisticated technical skills but rather exploits human psychology and trust.
upvoted 1 times
...
awesomeduck
1 year, 7 months ago
Selected Answer: A
Compared to eavesdropping, social engineering can be low tech in most cases.
upvoted 1 times
...
josevirtual
1 year, 11 months ago
Selected Answer: A
Everywhere I found information, including the courseware, it refers to interception of comunication between 2 devices. P. 1232: "Eavesdropping refers to an unauthorized person listening to a conversation or reading others’ messages. It includes the interception of any form of communication, including audio, video, or written, using channels such as telephone lines, email, and instant messaging. An attacker can obtain sensitive information such as passwords, business plans, phone numbers, and addresses." https://www.fortinet.com/resources/cyberglossary/eavesdropping https://www.investopedia.com/terms/e/eavesdropping-attack.asp https://www.sangfor.com/glossary/cybersecurity/what-is-eavesdropping-attack-and-how-does-it-work
upvoted 2 times
...
OyorQSEC
1 year, 11 months ago
Selected Answer: B
Voted B. Most of social engineering techniques need mid/high skills to GAIN ACCESS. For me the key is here. Eavesdropping is considered as a low-tech skill.
upvoted 3 times
...
Famous_Guy
2 years ago
Selected Answer: A
IT'S A
upvoted 1 times
...
Daniel8660
2 years, 1 month ago
Selected Answer: B
Types of Social Engineering Human-based Social Engineering Eavesdropping - Unauthorized listening of conversations, or reading of messages. (P.1227)
upvoted 1 times
...
Isharafaz
2 years, 1 month ago
Answer is A - key is low tech way, which is social engineering.
upvoted 1 times
...
astaroth
2 years, 3 months ago
Selected Answer: A
Anyone with social skills can perform this type of attack
upvoted 1 times
...
uday1985
2 years, 5 months ago
so social engineering is low tech? getting the payload? finding the vulnerability to exploit? reconn? what the ?
upvoted 1 times
...
ronxz
2 years, 5 months ago
Selected Answer: A
Social engineering is the art of manipulating people to divulge sensitive information to use it to perform some malicious action. (p. 1201) Eavesdropping refers to an unauthorized person listening to a conversation or reading others’ messages. It includes the interception of any form of communication, including audio, video, or written, using channels such as telephone lines, email, and instant messaging. (p. 1216)
upvoted 1 times
...
mdmdmd
2 years, 6 months ago
was actually leaning towards B, but A might be right
upvoted 2 times
Forrest43
1 year, 4 months ago
both are correct in my opinion. Eavesdropping can be non-technical. The question is not specific enough. If my students would get a question like this, they would sew me :-)
upvoted 1 times
...
...
RottenCow21
2 years, 6 months ago
Selected Answer: A
A is correct
upvoted 1 times
...
cazzobsb
2 years, 7 months ago
Selected Answer: A
correct
upvoted 1 times
...
pawel_ceh
2 years, 8 months ago
Selected Answer: A
Definitely A.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...