What term describes pretending to be a legitimate or authorized person to trick targets into revealing information?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

What term describes pretending to be a legitimate or authorized person to trick targets into revealing information?

Explanation:
In social engineering, impersonation is the tactic of adopting a credible, legitimate-sounding identity to manipulate someone into revealing sensitive information or granting access. By pretending to be a trusted person such as IT staff, a manager, or a vendor, the attacker exploits trust, authority, or urgency to bypass security controls. This fits the scenario described, where the attacker acts as a legitimate or authorized figure to coax secrets from targets. The other options aren’t about deceiving people into revealing data. Recon-ng, FOCA, and OSRFramework are OSINT/recon tools used to gather information about targets, not to impersonate someone to extract secrets.

In social engineering, impersonation is the tactic of adopting a credible, legitimate-sounding identity to manipulate someone into revealing sensitive information or granting access. By pretending to be a trusted person such as IT staff, a manager, or a vendor, the attacker exploits trust, authority, or urgency to bypass security controls. This fits the scenario described, where the attacker acts as a legitimate or authorized figure to coax secrets from targets.

The other options aren’t about deceiving people into revealing data. Recon-ng, FOCA, and OSRFramework are OSINT/recon tools used to gather information about targets, not to impersonate someone to extract secrets.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy