adplus-dvertising
frame-decoration

Question

Frank receives a message to his cell phone from a phone number that appears to be from the IRS. When he answers, the caller tells him that he has past due taxes and is in legal trouble. What type of social engineering attack has Frank encountered?

a.

A spear phishing attack

b.

A whaling attack

c.

A vishing attack

d.

A SMS phishing attack

Answer: (c).A vishing attack Explanation:Frank has encountered a vishing attack, a type of attack conducted via phone that often relies on a perception of authority and urgency to acquire information from its targets. A spear phishing attack targets specific individuals or groups, and whaling attacks are aimed at VIPs—neither of which are indicated in the question. The attack is via voice, not SMS, ruling that answer out too.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Frank receives a message to his cell phone from a phone number that appears to be from the IRS. When he answers, the caller tells him that he has past due taxes and is in legal...

Similar Questions

Discover Related MCQs

Q. Emily wants to gather information about an organization but does not want to enter the building. What physical data gathering technique can she use to potentially gather business documents without entering the building?

Q. Cameron sends a phishing email to all of the administrative assistants in a company. What type of phishing attack is he conducting?

Q. Which social engineering motivation technique relies on persuading the target that other people have behaved similarly and thus that they could too?

Q. Megan wants to clone an ID badge for the company that she is performing a penetration test against. Which of the following types of badge can be cloned without even touching it?

Q. Allan wants to gain access to a target company’s premises but discovers that his original idea of jumping the fence probably isn’t practical. His new plan is to pretend to be a delivery person with a box that requires a personal signature from an employee. What technique is he using?

Q. Charles sends a phishing email to a target organization and includes the line “Only five respondents will receive a cash prize.” Which social engineering motivation strategy is he using?

Q. What occurs during a quid pro quo social engineering attempt?

Q. Andrew knows that the employees at his target company frequently visit a football discussion site popular in the local area. As part of his penetration testing, he successfully places malware on the site and takes over multiple PCs belonging to employees. What type of attack has he used?

Q. Steve inadvertently sets off an alarm and is discovered by a security guard during an on-site penetration test. What should his first response be?

Q. A USB key drop is an example of what type of technique?

Q. Susan calls staff at the company she has been contracted to conduct a phishing campaign against, focusing on individuals in the finance department. Over a few days, she persuades an employee to send a wire transfer to an account she has set up after telling the employee that she has let their boss know how talented they are. What motivation technique has she used?

Q. Alexa carefully pays attention to an employee as they type in their entry code to her target organization’s high-security area and writes down the code that she observes. What type of attack has she conducted?