Which tactic involves forwarding messages to obtain free gifts or prizes?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which tactic involves forwarding messages to obtain free gifts or prizes?

Explanation:
Chain letters are a social-engineering tactic in which a message promises a free gift or prize if you forward it to others. The lure plays on greed or fear of missing out, pushing people to spread the message quickly to keep the “chain” going. This makes forwarding for gifts the defining feature of the tactic, as the attacker relies on social propagation rather than technical tricks. The other options don’t fit that specific pattern. Quid Pro Quo involves a direct exchange—something in return for information or access—rather than simply forwarding messages to claim a prize. Spimming uses instant messaging to push phishing or malware, not to recruit forwarders for gifts. Instant Chat Messenger isn’t a tactic by itself; it’s just a channel that could be used for various attacks, not the forwarding-for-prizes mechanism described.

Chain letters are a social-engineering tactic in which a message promises a free gift or prize if you forward it to others. The lure plays on greed or fear of missing out, pushing people to spread the message quickly to keep the “chain” going. This makes forwarding for gifts the defining feature of the tactic, as the attacker relies on social propagation rather than technical tricks.

The other options don’t fit that specific pattern. Quid Pro Quo involves a direct exchange—something in return for information or access—rather than simply forwarding messages to claim a prize. Spimming uses instant messaging to push phishing or malware, not to recruit forwarders for gifts. Instant Chat Messenger isn’t a tactic by itself; it’s just a channel that could be used for various attacks, not the forwarding-for-prizes mechanism described.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy