Which of the follow...
 
Notifications
Clear all

Which of the following social-engineering attacks does this describe?

1 Posts
1 Users
0 Likes
222 Views
(@leneaveorval)
Noble Member
Joined: 2 years ago
Posts: 705
Topic starter  

An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker's intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.

Which of the following social-engineering attacks does this describe?

  • A . Information elicitation
  • B . Typo squatting
  • C . Impersonation
  • D . Watering-hole attack

Show Answer Hide Answer

Suggested Answer: D

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: