New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU Network and Security Foundation Exam - Topic 1 Question 4 Discussion

Actual exam question for WGU's Network and Security Foundation exam
Question #: 4
Topic #: 1
[All Network and Security Foundation Questions]

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Show Suggested Answer Hide Answer
Suggested Answer: C

Social engineering involves manipulating people into divulging confidential information, often by impersonation, deception, or psychological tactics. Using a forged ID card to gain trust and extract sensitive information is a classic example of social engineering.

Brute-force attack attempts to guess passwords through automated methods.

Man-in-the-middle attack intercepts communication but does not rely on deception.

Pharming tricks users into visiting fraudulent websites but does not involve impersonation.


Contribute your Thoughts:

0/2000 characters
Zena
14 hours ago
100% social engineering, no doubt about it.
upvoted 0 times
...
Yaeko
6 days ago
I thought it was more like a man-in-the-middle thing.
upvoted 0 times
...
Rochell
11 days ago
Haha, who needs to hack when you can just con people? C is the way to go.
upvoted 0 times
...
Lucy
16 days ago
C) Social engineering. Forged ID cards? Classic social engineering tactic.
upvoted 0 times
...
Elena
21 days ago
I agree, C is the correct answer. Tricking people is way easier than hacking these days.
upvoted 0 times
...
Trevor
26 days ago
Definitely C. Social engineering is all about exploiting the human element, not technical vulnerabilities.
upvoted 0 times
...
Chauncey
1 month ago
C) Social engineering. The attacker used deception to manipulate the employee into revealing sensitive information.
upvoted 0 times
...
Glendora
1 month ago
I’m confused because I thought pharming was related to redirecting users, but this seems more personal. Maybe it is social engineering after all?
upvoted 0 times
...
Zack
1 month ago
This sounds a lot like the practice questions we did on social engineering tactics. I’m leaning towards option C.
upvoted 0 times
...
Jina
2 months ago
I'm not entirely sure, but I remember something about man-in-the-middle attacks being more about intercepting communications, not directly deceiving someone.
upvoted 0 times
...
Sang
2 months ago
I think this might be a social engineering attack since it involves tricking someone into giving up information.
upvoted 0 times
...
Marti
2 months ago
C) social engineering has to be the answer. The attacker is exploiting the human element rather than technical vulnerabilities.
upvoted 0 times
...
Milly
2 months ago
Definitely a social engineering attack!
upvoted 0 times
...
Precious
2 months ago
I'm leaning towards C) social engineering. The scenario describes the attacker using a forged ID to manipulate the employee.
upvoted 0 times
...
Anglea
2 months ago
Social engineering seems like the right answer here. The attacker is using deception to get the employee to reveal information.
upvoted 0 times
...
Shawna
3 months ago
Seems like a classic case of social engineering to me!
upvoted 0 times
...
Hyman
3 months ago
Hmm, I'm not sure. Could it also be a man-in-the-middle attack if the attacker is intercepting the communication?
upvoted 0 times
...
Emily
3 months ago
I think this is a social engineering attack, where the attacker tricks the employee into giving up sensitive info.
upvoted 0 times
Albina
3 months ago
Social engineering is so dangerous!
upvoted 0 times
...
...

Save Cancel