Ask Question
3 April, 00:52

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?

A. Pivoting

B. Malicious linking

C. Whaling

D. Keylogging

+1
Answers (1)
  1. 3 April, 01:06
    0
    Answer: C) Whaling

    Explanation:

    Whaling is defined as the hacking act in which hacker tends to search and hunt for confidential and high security data for attack and then using it for their own purpose. Those malicious practice is usually done on powerful and reputed position, organization such as banks, CEO's office etc.

    According to the question, whaling is taking place in the office of CEO through attacking his confidential resources to gain access and use it for further attack and benefits of his own. He has left no remaining logs of exploitation in sort amount of time.

    Other options are incorrect because pivoting, key-logging and malicious linking does not include hunting information and attacking. Thus, the correct option is option (C).
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's ...” in 📗 Social Studies if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers