Which tactic involves gathering information by initiating a conversation and tailoring questions to the victim's responses?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which tactic involves gathering information by initiating a conversation and tailoring questions to the victim's responses?

Explanation:
Gaining information by starting a conversation and shaping questions around what the other person says is elicitation. This social engineering tactic relies on a casual, trust-building dialogue where the attacker steers the discussion with open-ended questions and follow-ups based on the victim’s responses. The aim is to uncover useful details—like security habits, procedures, or credentials—without triggering suspicion, making the information flow feel natural to the target. Why this fits best: the essence is a conversational approach that adapts to what the victim reveals, gradually extracting valuable data. For example, a caller might casually ask about who handles account verification or what steps are needed to reset a password, using each answer to refine the next question. Why the other options don’t fit: chain letters spread messages to propagate themselves, hoax letters share misleading or alarming information, and scareware is malware that frightens users into taking unsafe actions. None of these involve the targeted, responsive questioning that characterizes elicitation.

Gaining information by starting a conversation and shaping questions around what the other person says is elicitation. This social engineering tactic relies on a casual, trust-building dialogue where the attacker steers the discussion with open-ended questions and follow-ups based on the victim’s responses. The aim is to uncover useful details—like security habits, procedures, or credentials—without triggering suspicion, making the information flow feel natural to the target.

Why this fits best: the essence is a conversational approach that adapts to what the victim reveals, gradually extracting valuable data. For example, a caller might casually ask about who handles account verification or what steps are needed to reset a password, using each answer to refine the next question.

Why the other options don’t fit: chain letters spread messages to propagate themselves, hoax letters share misleading or alarming information, and scareware is malware that frightens users into taking unsafe actions. None of these involve the targeted, responsive questioning that characterizes elicitation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy