EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
This tactic leverages social validation, as the receptionist assumes that if the request is associated with a high-ranking executive, it must be legitimate.
This tactic leverages reciprocation, as the receptionist assumes that helping Julia is part of their professional duty, especially since the request appears to come from a trusted source.
The receptionist complies, likely feeling an obligation to assist.

Opted Answer: D
The principle of reciprocity makes individuals feel obliged to return a favor, which attackers leverage to extract information.