Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 1 Question 41 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 41
Topic #: 1
[All CFR-210 Questions]

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lashawnda
16 days ago
This question is giving me flashbacks to that time I accidentally locked myself in the CEO's office. Good times, good times.
upvoted 0 times
Alease
1 days ago
A) Pivoting
upvoted 0 times
...
...
Lenny
18 days ago
B) Malicious linking, definitely. The attacker probably used some kind of phishing or social engineering trick to get the CEO to click on a nasty link. Classic move, if you ask me.
upvoted 0 times
...
Ariel
23 days ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
Mozell
3 days ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
...
...
Gracia
1 months ago
Hmm, this is a tough one. I'm leaning towards D) Keylogging, since the attacker was able to access the CEO's credentials. But the lack of any traces or logs is throwing me off a bit.
upvoted 0 times
Deonna
22 days ago
I think C) Whaling could also be a possibility. The attacker targeted a high-level executive like the CEO.
upvoted 0 times
...
Lacey
1 months ago
A) Pivoting sounds more likely in this scenario. The attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
1 months ago
But the attacker used the CEO's credentials, which is more related to Whaling.
upvoted 0 times
...
Armando
2 months ago
I disagree, I believe the answer is A) Pivoting.
upvoted 0 times
...
Sarah
2 months ago
Wow, this is a tricky one! The attacker seems to have pulled off a pretty sophisticated attack. I'm gonna go with C) Whaling - that sounds like the most fitting description of what happened here.
upvoted 0 times
Jarod
23 days ago
I agree with you, A) Pivoting seems like the most appropriate choice in this scenario.
upvoted 0 times
...
Darrin
28 days ago
I think it's A) Pivoting, because the attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
2 months ago
I think the answer is C) Whaling.
upvoted 0 times
...

Save Cancel