Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 15 Topic 2 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 15 Topic 2 Discussion

312-85 Exam Topic 2 Question 15 Discussion:
Question #: 15
Topic #: 2

A threat analyst working in XYZ Company was asked to perform threat intelligence analysis. During the information collection phase, he used a social engineering technique where he pretended to be a legitimate or authorized person. Using this technique, he gathered sensitive information by scanning terminals for passwords, searching important documents on desks, rummaging bins, and so on.

Which of the following social engineering techniques was used by the analyst for information collection?


A.

Impersonation


B.

Shoulder surfing


C.

Piggybacking


D.

Dumpster diving


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.