Which technique uses voice technology such as the telephone system or VoIP to obtain personal or financial information?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique uses voice technology such as the telephone system or VoIP to obtain personal or financial information?

Explanation:
Vishing is a form of social engineering that uses voice channels—phone calls or VoIP—to trick people into revealing personal or financial information. Attackers pose as banks, tech support, or other trusted entities, create a sense of urgency, and ask for sensitive data such as account numbers, PINs, passwords, or one-time codes. The key here is the method: the manipulation happens through voice communication, not through email or physical access. This makes it the best fit because the scenario specifically describes using telephone systems to obtain information, whereas the other options involve different attack vectors—physical entry, romantic or social manipulation, or redirecting funds—without relying on voice-based information disclosure. To defend against vishing, verify identities through independent channels, avoid sharing sensitive data over the phone, and rely on official contact methods rather than caller-provided information.

Vishing is a form of social engineering that uses voice channels—phone calls or VoIP—to trick people into revealing personal or financial information. Attackers pose as banks, tech support, or other trusted entities, create a sense of urgency, and ask for sensitive data such as account numbers, PINs, passwords, or one-time codes. The key here is the method: the manipulation happens through voice communication, not through email or physical access.

This makes it the best fit because the scenario specifically describes using telephone systems to obtain information, whereas the other options involve different attack vectors—physical entry, romantic or social manipulation, or redirecting funds—without relying on voice-based information disclosure. To defend against vishing, verify identities through independent channels, avoid sharing sensitive data over the phone, and rely on official contact methods rather than caller-provided information.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy