New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 10 Question 49 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 49
Topic #: 10
[All 212-82 Questions]

Jane Is a newly appointed Chief Financial Officer at BigTech Corp. Within a week, she receives an email from a sender posing as the company's CEO. instructing her to make an urgent wire transfer. Suspicious. Jane decides to verify the request's authenticity. She receives another email from the same sender, now attaching a seemingly scanned Image of the CEO's handwritten note. Simultaneously, she gets a call from an 'IT support' representative, instructing her to click on the attached image to download a 'security patch'. Concerned. Jane must determine which social engineering tactics she encountered.

Show Suggested Answer Hide Answer
Suggested Answer: D

Jane encountered a combination of social engineering tactics:

Spear Phishing:

CEO Impersonation Email: The initial email and the follow-up with the scanned image of the CEO's handwritten note are examples of spear phishing, where attackers target specific individuals with tailored messages to gain their trust and extract sensitive information.

Vishing:

'IT Support' Call: The phone call from the supposed 'IT support' representative asking Jane to download a 'security patch' is a form of vishing (voice phishing). This tactic involves using phone calls to trick victims into revealing sensitive information or performing actions that compromise security.


Social Engineering Techniques: SANS Institute Reading Room

Phishing and Vishing Explained: Norton Security

Contribute your Thoughts:

0/2000 characters
Sheron
3 months ago
I disagree, it’s all about the impersonation tactics here!
upvoted 0 times
...
Reena
3 months ago
I think it's more about baiting with the image attachment.
upvoted 0 times
...
Ammie
3 months ago
Definitely vishing involved with that IT call.
upvoted 0 times
...
Tresa
4 months ago
Wait, how can she trust the handwritten note? Seems sketchy!
upvoted 0 times
...
Vallie
4 months ago
Sounds like classic spear phishing to me.
upvoted 0 times
...
Tanja
4 months ago
I think the 'IT support' call is a form of vishing, which makes option D sound right, but I'm not completely confident about the email part.
upvoted 0 times
...
Janine
4 months ago
This scenario feels like a classic case of phishing, but I also see elements of social engineering. I wonder if option B is correct since it mentions quizzing.
upvoted 0 times
...
Von
4 months ago
I'm not entirely sure, but I think baiting involves enticing someone to click on something, like the image. Maybe option A?
upvoted 0 times
...
Ezekiel
5 months ago
I remember studying about spear phishing and how it targets specific individuals, so option D seems likely with the CEO impersonation.
upvoted 0 times
...
Krissy
5 months ago
The handwritten note image and the 'IT support' call seem like they're trying to bait me into downloading something, but the emails also look like spear phishing. I'm a little unsure, but I'll go with option D to be safe.
upvoted 0 times
...
Rolande
5 months ago
Okay, I think I've got it. The CEO impersonation email is a form of phishing, and the 'IT support' call with the attached image is a type of baiting. I'll go with option A.
upvoted 0 times
...
Britt
5 months ago
The CEO impersonation email and the 'IT support' call seem like clear attempts at social engineering, but I'm not sure which specific tactics they represent. I'll need to review the definitions carefully.
upvoted 0 times
...
Cristal
5 months ago
This question seems straightforward, but I want to make sure I understand the different social engineering tactics involved before selecting an answer.
upvoted 0 times
...
Kirk
11 months ago
I think it was phishing through the CEO impersonation email and baiting via the 'IT support' call.
upvoted 0 times
...
Felicitas
11 months ago
I believe it was baiting through the handwritten note image and preloading through the 'IT support' call.
upvoted 0 times
...
Suzan
11 months ago
Ah, the old 'IT support' trick. Classic social engineering. Good thing Jane is on the ball and didn't fall for it!
upvoted 0 times
Danica
10 months ago
Jane: It was definitely spear phishing and vishing.
upvoted 0 times
...
Cecily
11 months ago
Jane: I'm glad I didn't click on that image.
upvoted 0 times
...
Geraldo
11 months ago
Jane: That 'IT support' call seemed fishy.
upvoted 0 times
...
...
India
11 months ago
I agree, the CEO impersonation email and the 'IT support' call seem like spear phishing and vishing.
upvoted 0 times
...
Wilda
11 months ago
I bet the scammers are having a field day with all these remote work setups. Gotta stay vigilant, Jane!
upvoted 0 times
...
Raina
11 months ago
Hmm, I'm not sure. The 'IT support' call feels more like baiting to me. But the CEO email is definitely spear phishing. This is a tricky one!
upvoted 0 times
Carmela
11 months ago
User 3: The 'IT support' call could be baiting to make you click on the attachment.
upvoted 0 times
...
Earlean
11 months ago
User 2: I agree, it's a common tactic to impersonate someone in authority.
upvoted 0 times
...
Theola
11 months ago
User 1: The CEO email is definitely spear phishing.
upvoted 0 times
...
...
Stephaine
12 months ago
I think the answer is D. Spear phishing through the CEO email and vishing with the 'IT support' call. The handwritten note is just a clever attempt to add legitimacy to the scam.
upvoted 0 times
...
Tennie
12 months ago
This is a classic case of spear phishing. The CEO impersonation email and the 'IT support' call are clear tactics to get Jane to click on that malicious attachment.
upvoted 0 times
Kati
11 months ago
This is a classic case of spear phishing. The CEO impersonation email and the 'IT support' call are clear tactics to get Jane to click on that malicious attachment.
upvoted 0 times
...
Pamela
11 months ago
B) Spear phishing through both the emails and quizzing via the 'IT support' call.
upvoted 0 times
...
Jacklyn
11 months ago
A) Baiting via the handwritten note image and preloading through the 'IT support' call.
upvoted 0 times
...
...
Lavelle
12 months ago
I think the tactics used were spear phishing and vishing.
upvoted 0 times
...

Save Cancel