New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Logical Operations CyberSec First Responder CFR-210 Question # 28 Topic 3 Discussion

Logical Operations CyberSec First Responder CFR-210 Question # 28 Topic 3 Discussion

CFR-210 Exam Topic 3 Question 28 Discussion:
Question #: 28
Topic #: 3

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO’s office. The attacker was in the CEO’s office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?


A.

Pivoting


B.

Malicious linking


C.

Whaling


D.

Keylogging


Get Premium CFR-210 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.