A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:2 mins read

A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

  • social proof
  • fear
  • authority
  • scarcity
Explanation & Hints:

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments