312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 180


During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

Show Answer
Correct Answer: AB

Dumpster diving would be the least likely method of social engineering to yield beneficial information based on the data collected using Maltego. The collected information primarily revolves around digital and network infrastructure details such as domains, DNS names, Netblocks, and IP addresses. Dumpster diving focuses on physical documents, which are less likely to provide relevant insights directly related to digital or Internet infrastructure. In contrast, impersonating an ISP, shoulder surfing, and eavesdropping have a higher likelihood of yielding information pertinent to the network or digital realm.

Discussion

6 comments
Sign in to comment
brrbrrOption: A
Feb 21, 2024

The least likely method of social engineering to yield beneficial information would be: A. Dumpster diving in the target company's trash bins for valuable printouts. Maltego is a digital footprinting tool that gathers information about the target's Internet infrastructure, such as domains, DNS names, Netblocks, and IP addresses. Dumpster diving, on the other hand, involves physically searching through an organization's trash bins for discarded printouts or documents. This method is less likely to yield beneficial information related to the Internet infrastructure details obtained using Maltego, as it focuses on physical documents rather than digital assets. The other options (B, C, and D) involve social engineering techniques that are more aligned with digital or human interactions.

qtygbapjpesdayazko
Mar 3, 2024

This is the way

insaniuntOption: B
Feb 11, 2024

B. Impersonating an ISP technical support agent to trick the target into providing further network details

qwerty100Option: C
Feb 28, 2024

C. Shoulder surfing to observe sensitive credentials input on the target’s computers

LordXanderOption: A
Apr 2, 2024

Well, B is definitely not correct for one single reason: you already have the IP, so you know who the ISP is and you could definitely get come info. C&D are more efetive when you already have some information mapped...however quite questionable when you only have some IPs. A...for A you don't need any prerequisites hence it makes a lot of sense to be A.

94578deOption: C
Jun 21, 2024

The correct answer is C because to perform shoulder surfing you have to be in the facility and stay behind an employee's shoulder

ametahOption: A
Jun 22, 2024

The key word that changes the equation in this question is "least likely method". Therefore, "Dumpster diving" would be the least likely method of social engineering to yield beneficial information based on the data collected.