CompTIA Security+ SY0-601 Exam: Social-Engineering Techniques - Bank Details Scam

Identifying Social-Engineering Techniques in the SY0-601 Exam

Prev Question Next Question

Question

A user received an SMS on a mobile phone that asked for bank details.

Which of the following social-engineering techniques was used in this case?

A.

SPIM B.

Vishing C.

Spear phishing D.

Smishing.

D.

Explanations

A user received an SMS on a mobile phone that asked for bank details.

Which of the following social-engineering techniques was used in this case?

A.

SPIM

B.

Vishing

C.

Spear phishing

D.

Smishing.

D.

The social-engineering technique that was used in this case is Smishing, as it involves the use of SMS or text messages to trick victims into revealing their sensitive information. Smishing is a type of phishing attack that relies on text messages instead of emails, phone calls or other forms of communication. The attacker sends a text message that appears to be from a legitimate source, such as a bank or a financial institution, and asks the victim to provide their personal or financial information.

Smishing attacks are usually carried out by cybercriminals who use social engineering tactics to deceive the victim into responding to the text message. They may use a variety of tactics, such as urgency, fear, or curiosity to encourage the victim to respond. For example, the text message may claim that there has been suspicious activity on the victim's account and they need to confirm their details, or that they have won a prize and need to provide their information to claim it.

To avoid falling victim to smishing attacks, users should be cautious when receiving unsolicited text messages, especially those that ask for sensitive information. They should verify the authenticity of the sender before responding to the message, by contacting the institution or organization directly or by checking their website or social media channels for any alerts or warnings about smishing attacks. Users should also avoid clicking on links or downloading attachments from unknown sources, as these may contain malware or other malicious software that can compromise their device or steal their data.