New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HPE6-A78 Exam - Topic 10 Question 24 Discussion

Actual exam question for HP's HPE6-A78 exam
Question #: 24
Topic #: 10
[All HPE6-A78 Questions]

Which attack is an example or social engineering?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Leatha
4 months ago
I’m not so sure A is social engineering... seems too obvious!
upvoted 0 times
...
King
4 months ago
Wait, are people really falling for that fake bank site stuff?
upvoted 0 times
...
Ivan
4 months ago
A is the only one that involves tricking people directly.
upvoted 0 times
...
Mammie
4 months ago
I think B is more about technical hacking, not social engineering.
upvoted 0 times
...
Elizabeth
4 months ago
Definitely A, that's classic phishing!
upvoted 0 times
...
Rosendo
5 months ago
I’m a bit confused; I thought social engineering was more about direct interaction. But A does seem to fit the definition better than the others.
upvoted 0 times
...
Latosha
5 months ago
I practiced a question like this before, and I feel like eavesdropping isn't really social engineering. So, I guess it has to be A.
upvoted 0 times
...
Lashunda
5 months ago
I'm not entirely sure, but I remember something about phishing being a type of social engineering. That makes me lean towards A too.
upvoted 0 times
...
Glen
5 months ago
I think social engineering is all about manipulating people, so option A sounds right since it involves tricking users into giving away their info.
upvoted 0 times
...
Audry
5 months ago
I've got this! The common risk response strategy for both positive and negative risks is Accept. I'm confident that's the right answer.
upvoted 0 times
...
Rory
5 months ago
I think the answer might be "Misprision of felony," but I'm not entirely sure. We talked about it in class, but I need to remember the specifics.
upvoted 0 times
...
Solange
5 months ago
I think I know the answer to this one. Option C seems right - the subprocess can be reused and called from other processes.
upvoted 0 times
...
Cherelle
5 months ago
I feel like this scenario relates to a practice question we had on ethics in planning. Maybe reaching out to a mentor first would give me some clarity before talking to my supervisor.
upvoted 0 times
...

Save Cancel