Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 5 Question 43 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 43
Topic #: 5
[All CFR-210 Questions]

Which of the following could an attacker use to perpetrate a social engineering attack? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D, E

Contribute your Thoughts:

Tashia
13 days ago
Company uniform and phone call, for sure. Those are classic social engineering tactics. Although, I gotta say, the 'blackdoor' option is just making me chuckle. Is that like a backdoor, but with a little extra edge?
upvoted 0 times
...
Jannette
17 days ago
Ooh, a Yagi antenna? That's a new one! I guess the attacker could use it to... I don't know, eavesdrop on the company's communications or something? Not exactly a social engineering tactic, but I'll give them points for creativity.
upvoted 0 times
Marta
2 days ago
A) Keylogger
upvoted 0 times
...
...
Rosio
20 days ago
Keylogger and blackdoor? Really? Those sound more like tools for a digital attack, not a social one. But hey, at least they're trying to think outside the box, right?
upvoted 0 times
...
Ettie
1 months ago
Well, the company uniform and a phone call definitely seem like viable options for a social engineering attack. Gotta love how these options are just handing over the keys to the kingdom!
upvoted 0 times
Glory
7 days ago
E) Phone call
upvoted 0 times
...
Miesha
13 days ago
C) Company uniform
upvoted 0 times
...
Apolonia
28 days ago
C) Company uniform
upvoted 0 times
...
Augustine
29 days ago
A) Keylogger
upvoted 0 times
...
Lore
30 days ago
A) Keylogger
upvoted 0 times
...
...
Leatha
2 months ago
I think C) Company uniform could also be used. An attacker could impersonate an employee to gain access to restricted areas.
upvoted 0 times
...
Erick
2 months ago
I agree with Izetta. Keylogger can be used to steal sensitive information and a phone call can be used to manipulate someone into revealing information.
upvoted 0 times
...
Izetta
2 months ago
A) Keylogger and E) Phone call
upvoted 0 times
...

Save Cancel