hiexam
eccouncil · 312-50v13 · Q428 · multiple_choice · topic_1

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralle…

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?
  • A.Baiting
  • B.Piggybacking
  • C.Diversion theft
  • D.Honey trap
Explanation
Selected Answer: D Honey trap

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.