A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:
Rationale for Correct Answer:Social engineering involves manipulating or deceiving people into revealing confidential information or taking actions that aid the attacker (e.g., clicking malicious links, sharing credentials). It targets human weaknesses rather than technical vulnerabilities.
Analysis of Incorrect Options:
A. IP spoofing – Forging an IP address to disguise origin.
B. Electronic piggybacking – Unauthorized use of someone else’s access connection.
C. Packet sniffing – Monitoring data traffic across a network.
Key Concept: Cyberfraud techniques – social engineering.
[Reference: ACFE Manual, Fraud Prevention and Deterrence – Social Engineering Attacks., , , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit