EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 719  
   
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company‘s main office in Iowa. She states that she needs the receptionist‘s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?


 
A:    Social Validation
 
B:    Scarcity
C:    Friendship/Liking
 
D:    Reciprocation
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 21/05/2025
Opted Answer: A
This tactic leverages social validation, as the receptionist assumes that if the request is associated with a high-ranking executive, it must be legitimate.


This tactic leverages reciprocation, as the receptionist assumes that helping Julia is part of their professional duty, especially since the request appears to come from a trusted source.
The receptionist complies, likely feeling an obligation to assist.

Pradeep Thomas on 24/02/2024
Opted Answer: D
The principle of reciprocity makes individuals feel obliged to return a favor, which attackers leverage to extract information.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations