Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPT All Questions

View all questions & answers for the CIPT exam

Exam CIPT topic 1 question 140 discussion

Actual exam question from IAPP's CIPT
Question #: 140
Topic #: 1
[All CIPT Questions]

Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?

  • A. Spam.
  • B. Phishing.
  • C. Unsolicited sexual imagery.
  • D. Consensually-shared sexual imagery.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
hele_meneer
3 months ago
Selected Answer: C
C definitely and maybe B
upvoted 1 times
...
Ssourav
3 months, 2 weeks ago
Selected Answer: C
C. Unsolicited sexual imagery. Unsolicited sexual imagery, often associated with "sextortion" or "cyber-flashing," can be sent to individuals regardless of whether the sender knows them personally or not. This type of content is sent to both acquaintances and strangers, often with the intent to harass, coerce, or exploit. Phishing is typically used to deceive individuals into revealing sensitive information or credentials by pretending to be a trusted entity. While phishing can target a wide audience, including both acquaintances and strangers, its primary goal is usually to obtain confidential information rather than to harass or coerce.
upvoted 1 times
Ssourav
3 months ago
on second thought it could be B. Phishing is the correct answer. Phishing is designed to deceive and target both individuals who might be known to the attacker and strangers, as it often involves tricking people into divulging personal information through deceptive emails or messages.
upvoted 1 times
...
...
ofirga
9 months, 1 week ago
Selected Answer: B
B. Phishing is a mode of interaction that often targets both people who personally know the attacker and strangers. Phishing attempts involve tricking individuals into revealing sensitive information (such as login credentials or financial details) by posing as a trustworthy entity. These deceptive messages can be sent to a wide range of recipients, including acquaintances and unknown individuals. It’s essential to stay vigilant and verify the legitimacy of any requests for personal information to avoid falling victim to phishing attacks.
upvoted 1 times
...
Sbowo
2 years, 11 months ago
Spam. Sometimes email from friends labeled as spam even it doesn’t
upvoted 1 times
...
k4d4v4r
3 years ago
Phishing: When you don't know Spear Phishing: Directed to someone you know
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...