Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 1 Question 41 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 41
Topic #: 1
[All CFR-210 Questions]

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lashawnda
2 months ago
This question is giving me flashbacks to that time I accidentally locked myself in the CEO's office. Good times, good times.
upvoted 0 times
Rima
26 days ago
D) Keylogging
upvoted 0 times
...
Deonna
1 months ago
B) Malicious linking
upvoted 0 times
...
Clay
2 months ago
C) Whaling
upvoted 0 times
...
Alease
2 months ago
A) Pivoting
upvoted 0 times
...
...
Lenny
2 months ago
B) Malicious linking, definitely. The attacker probably used some kind of phishing or social engineering trick to get the CEO to click on a nasty link. Classic move, if you ask me.
upvoted 0 times
...
Ariel
2 months ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
Anglea
1 months ago
A) Pivoting makes sense. It's like the attacker used the CEO's credentials as a pivot point to launch more attacks.
upvoted 0 times
...
Hayley
2 months ago
B) Malicious linking sounds like it could be the right answer. Maybe the attacker used some sort of malicious link to gain access to the CEO's credentials.
upvoted 0 times
...
Mozell
2 months ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
...
...
Gracia
3 months ago
Hmm, this is a tough one. I'm leaning towards D) Keylogging, since the attacker was able to access the CEO's credentials. But the lack of any traces or logs is throwing me off a bit.
upvoted 0 times
Carin
23 days ago
I can see where you're coming from. It's definitely a tricky situation with no clear answer.
upvoted 0 times
...
Wava
24 days ago
That's a good point. But I still think D) Keylogging makes the most sense since the attacker gained access to the CEO's credentials.
upvoted 0 times
...
Shanice
25 days ago
I see your point, but I think C) Whaling could also be a possibility. The attacker targeted a high-level executive like the CEO.
upvoted 0 times
...
Benton
26 days ago
A) Pivoting sounds more likely in this scenario. The attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
Cherri
27 days ago
I agree with you on D) Keylogging. The attacker must have captured the CEO's credentials somehow.
upvoted 0 times
...
Shaquana
1 months ago
B) Malicious linking could be the answer. The attacker may have used external resources to gain access to the CEO's office.
upvoted 0 times
...
Deonna
2 months ago
I think C) Whaling could also be a possibility. The attacker targeted a high-level executive like the CEO.
upvoted 0 times
...
Lacey
3 months ago
A) Pivoting sounds more likely in this scenario. The attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
3 months ago
But the attacker used the CEO's credentials, which is more related to Whaling.
upvoted 0 times
...
Armando
3 months ago
I disagree, I believe the answer is A) Pivoting.
upvoted 0 times
...
Sarah
3 months ago
Wow, this is a tricky one! The attacker seems to have pulled off a pretty sophisticated attack. I'm gonna go with C) Whaling - that sounds like the most fitting description of what happened here.
upvoted 0 times
Jarod
2 months ago
I agree with you, A) Pivoting seems like the most appropriate choice in this scenario.
upvoted 0 times
...
Darrin
2 months ago
I think it's A) Pivoting, because the attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
3 months ago
I think the answer is C) Whaling.
upvoted 0 times
...

Save Cancel