New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSAv10 Exam - Topic 7 Question 28 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 28
Topic #: 7
[All ECSAv10 Questions]

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid

a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa.

She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.

What principal of social engineering did Julia use?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Tequila
4 months ago
Definitely a case of social validation with the CEO's name drop.
upvoted 0 times
...
Lyla
4 months ago
Wait, how did she get the password so easily? Seems fishy!
upvoted 0 times
...
Lashunda
4 months ago
I thought it was more about friendship or liking, but I guess not.
upvoted 0 times
...
Dana
4 months ago
Totally agree, that’s classic social engineering!
upvoted 0 times
...
Kimbery
5 months ago
She used the authority principle by mentioning the CEO.
upvoted 0 times
...
Bo
5 months ago
I thought Scarcity was about limited resources, so I don't think that's applicable here. It seems more like she leveraged authority, which might tie back to Social Validation.
upvoted 0 times
...
Van
5 months ago
I remember a practice question where we discussed how authority figures influence decisions. This feels similar, but I can't recall the exact principle.
upvoted 0 times
...
Jutta
5 months ago
I think Julia used the principle of Social Validation since she mentioned the CEO's name, which might make the receptionist feel it's a legitimate request.
upvoted 0 times
...
Vivan
5 months ago
I'm not entirely sure, but it seems like it could also relate to Friendship/Liking because she was friendly and posed as someone from the company.
upvoted 0 times
...
Portia
5 months ago
Okay, I've got this. OSPF supports broadcast, non-broadcast multi-access, point-to-point, and point-to-multipoint networks. I'll select the two that I'm most confident are supported on the Nokia 7750 SR.
upvoted 0 times
...
Gabriele
5 months ago
This seems like a straightforward question about network monitoring. I'd go with the firewall log option - that's likely where I'd find the most detailed information about employee actions on the network.
upvoted 0 times
...
Jerrod
5 months ago
Hmm, website URL blacklisting could work, but it might be a bit limited in scope. I'll have to weigh the pros and cons of each choice.
upvoted 0 times
...

Save Cancel