اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 174 من 180

كل الأسئلة

Johnson, an attacker, called a cybersecurity firm pretending to be vendor technical support, warned of an imminent compromise, and convinced the victim to run unusual commands and install malicious files that exfiltrated data. What social engineering technique did he use?

الخيارات

  • A Quid Pro Quo
  • B Diversion theft
  • C Elicitation
  • D Phishing

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.