The described activity involves pretending to be a legitimate or authorized person in order to gather sensitive information. This social engineering technique is known as Impersonation.
Impersonation is a form of deception in which the attacker pretends to be someone else — such as an employee, contractor, or service technician — to gain access to restricted information or areas. In this method, the attacker often relies on trust, authority, or familiarity to manipulate others into revealing confidential data.
In the scenario, the analyst obtained information by observing terminals, searching desks, and examining bins while pretending to be a trusted individual. This fits the definition of impersonation rather than other social engineering methods.
Why the Other Options Are Incorrect:
Shoulder surfing: Involves directly observing someone’s screen or keyboard to capture credentials or data, not pretending to be someone else.
Piggybacking: Refers to physically following an authorized person into a restricted area without proper authentication.
Dumpster diving: Involves searching discarded items, such as trash or recycle bins, to find confidential information, without human interaction or pretense.
Conclusion:
The analyst used Impersonation to pose as an authorized person and collect sensitive data.
Final Answer: A. Impersonation
Explanation Reference (Based on CTIA Study Concepts):
From the CTIA study materials under “Social Engineering and Threat Collection Techniques,” impersonation is identified as a key human-based technique for gathering information during reconnaissance.
Submit