New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA SY0-701 Exam - Topic 5 Question 33 Discussion

Actual exam question for CompTIA's SY0-701 exam
Question #: 33
Topic #: 5
[All SY0-701 Questions]

A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?

Show Suggested Answer Hide Answer
Suggested Answer: B

Smishing is a type of phishing attack that uses SMS text messages to deceive recipients into taking actions such as revealing sensitive information. The urgency in the text indicates this vector. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 2: Threats, Section: 'Social Engineering Techniques'.


Contribute your Thoughts:

0/2000 characters
Joana
3 months ago
Wow, I didn't realize how common this is!
upvoted 0 times
...
Lillian
3 months ago
Wait, are we sure it's not just a prank?
upvoted 0 times
...
Vicente
3 months ago
Totally agree, it's impersonation for sure.
upvoted 0 times
...
Jess
4 months ago
I think it's more like pretexting.
upvoted 0 times
...
Cherelle
4 months ago
That's definitely smishing!
upvoted 0 times
...
Glenna
4 months ago
I’m confused about the differences between these terms. Is pretexting just a type of impersonation?
upvoted 0 times
...
Lenna
4 months ago
I remember practicing a question about pretexting, and this feels similar, but I’m leaning towards smishing.
upvoted 0 times
...
Helaine
4 months ago
I'm not entirely sure, but it could also be impersonation since the sender claims to be the CEO.
upvoted 0 times
...
Viki
5 months ago
I think this might be smishing since it's a text message asking for sensitive info.
upvoted 0 times
...
Karl
5 months ago
I'm pretty confident the answer is Smishing. The attacker is using a text message to try and trick the admin into resetting a password, which is a classic Smishing tactic.
upvoted 0 times
...
Yan
5 months ago
I'm a little confused on the difference between Pretexting and Impersonation. They both seem like they could apply here. I'll have to think about this one a bit more.
upvoted 0 times
...
Corrinne
5 months ago
Okay, let me think this through. The message is trying to get the admin to reset a password, so it's probably a social engineering attack. I'll go with Smishing since it's a text message.
upvoted 0 times
...
Walton
5 months ago
Hmm, I'm not sure about this one. Could it also be Impersonation? The message is from an unknown number, so it's hard to tell if it's really the CEO.
upvoted 0 times
...
Cassie
5 months ago
This one seems pretty straightforward. The message is claiming to be from the CEO, so I think the answer is Pretexting.
upvoted 0 times
...
Ronald
1 year ago
I'm going with impersonation on this one. Whoever sent that text is trying to pose as the CEO and exploit the admin's trust. C'mon, everyone knows the real CEO would just call if there was an emergency!
upvoted 0 times
Devora
12 months ago
D: Impersonation for sure. Always better to be safe than sorry with these kinds of messages.
upvoted 0 times
...
Lino
12 months ago
C: Smishing is also a possibility, but impersonation seems more likely in this case.
upvoted 0 times
...
Marilynn
12 months ago
B: I agree, it's a classic impersonation tactic to trick the admin.
upvoted 0 times
...
Lauryn
12 months ago
A: Definitely impersonation. The CEO wouldn't text for a password reset.
upvoted 0 times
...
...
Fanny
1 year ago
I see your point, but I still think it's Impersonation because they're pretending to be someone they're not.
upvoted 0 times
...
Lavonna
1 year ago
But what about Pretexting? They could be using a fake emergency.
upvoted 0 times
...
Tu
1 year ago
Hmm, I'd say this is a case of pretexting. The attacker's trying to create a plausible scenario to manipulate the admin into giving up sensitive info. Clever, but not clever enough!
upvoted 0 times
...
Arlyne
1 year ago
Smishing, huh? I bet the CEO's phone got hacked, and now the attacker is trying to phish for that password. Not falling for that one, I'm gonna double-check that message!
upvoted 0 times
Minna
11 months ago
Impersonating the CEO is a classic tactic for these types of attacks.
upvoted 0 times
...
Linette
12 months ago
I've heard of similar scams before, it's important to stay vigilant.
upvoted 0 times
...
Earleen
12 months ago
Definitely, always better to double-check before giving out any sensitive information.
upvoted 0 times
...
Rolland
12 months ago
I think you're right, that sounds like a smishing attack.
upvoted 0 times
...
Earlean
1 year ago
Definitely a red flag, always better to verify before giving out any sensitive information.
upvoted 0 times
...
Melissia
1 year ago
I think you're right, it sounds like a classic smishing attack.
upvoted 0 times
...
...
Nichelle
1 year ago
I agree, the CEO wouldn't text for a password reset.
upvoted 0 times
...
Milly
1 year ago
I think it's Impersonation.
upvoted 0 times
...
Kiley
1 year ago
Wow, this is a classic case of impersonation! The CEO's text message is clearly a pretext to trick the admin into resetting the password. Gotta watch out for those clever social engineering tactics.
upvoted 0 times
Yuette
1 year ago
C: Pretexting is a sneaky tactic. Stay vigilant against social engineering attacks.
upvoted 0 times
...
Hollis
1 year ago
B: Smishing is a serious threat. Always verify before taking action.
upvoted 0 times
...
Kristian
1 year ago
A: Definitely impersonation. The CEO wouldn't ask for a password reset over text.
upvoted 0 times
...
...

Save Cancel