Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 4 Question 21 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 21
Topic #: 4
[All ISSAP Questions]

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Show Suggested Answer Hide Answer
Suggested Answer: C

Impersonation: In the impersonation social engineering attack, an attacker pretends to be someone else, for example, the employee's

friend, a repairman, or a delivery person.

In Person Attack: In this attack, the attacker just visits the organization and collects information. To accomplish such an attack, the

attacker can call a victim on the phone, or might simply walk into an office and pretend to be a client or a new worker.

Important User Posing: In this attack, the attacker pretends to be an important member of the organization. This attack works

because there is a common belief that it is not good to question authority.

Third-Party Authorization: In this attack, the attacker tries to make the victim believe that he has the approval of a third party. This

works because people believe that most people are good and they are being truthful about what they are saying.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77