Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 1 Question 41 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 41
Topic #: 1
[All CFR-210 Questions]

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lashawnda
1 months ago
This question is giving me flashbacks to that time I accidentally locked myself in the CEO's office. Good times, good times.
upvoted 0 times
Deonna
3 days ago
B) Malicious linking
upvoted 0 times
...
Clay
16 days ago
C) Whaling
upvoted 0 times
...
Alease
17 days ago
A) Pivoting
upvoted 0 times
...
...
Lenny
1 months ago
B) Malicious linking, definitely. The attacker probably used some kind of phishing or social engineering trick to get the CEO to click on a nasty link. Classic move, if you ask me.
upvoted 0 times
...
Ariel
1 months ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
Anglea
14 days ago
A) Pivoting makes sense. It's like the attacker used the CEO's credentials as a pivot point to launch more attacks.
upvoted 0 times
...
Hayley
16 days ago
B) Malicious linking sounds like it could be the right answer. Maybe the attacker used some sort of malicious link to gain access to the CEO's credentials.
upvoted 0 times
...
Mozell
19 days ago
A) Pivoting, for sure! The attacker used the CEO's office as a jumping-off point to conduct further attacks. It's like a fancy game of hopscotch, but with more hacking involved.
upvoted 0 times
...
...
Gracia
2 months ago
Hmm, this is a tough one. I'm leaning towards D) Keylogging, since the attacker was able to access the CEO's credentials. But the lack of any traces or logs is throwing me off a bit.
upvoted 0 times
Shaquana
6 days ago
B) Malicious linking could be the answer. The attacker may have used external resources to gain access to the CEO's office.
upvoted 0 times
...
Deonna
1 months ago
I think C) Whaling could also be a possibility. The attacker targeted a high-level executive like the CEO.
upvoted 0 times
...
Lacey
2 months ago
A) Pivoting sounds more likely in this scenario. The attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
2 months ago
But the attacker used the CEO's credentials, which is more related to Whaling.
upvoted 0 times
...
Armando
2 months ago
I disagree, I believe the answer is A) Pivoting.
upvoted 0 times
...
Sarah
2 months ago
Wow, this is a tricky one! The attacker seems to have pulled off a pretty sophisticated attack. I'm gonna go with C) Whaling - that sounds like the most fitting description of what happened here.
upvoted 0 times
Jarod
1 months ago
I agree with you, A) Pivoting seems like the most appropriate choice in this scenario.
upvoted 0 times
...
Darrin
1 months ago
I think it's A) Pivoting, because the attacker used the CEO's credentials to conduct further attacks.
upvoted 0 times
...
...
Corinne
2 months ago
I think the answer is C) Whaling.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77