In social engineering training, which principle was demonstrated when an attacker leverages a superior's name to obtain credentials?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

In social engineering training, which principle was demonstrated when an attacker leverages a superior's name to obtain credentials?

Explanation:
Leveraging a superior’s name taps into the reciprocation instinct. When someone signals backing by citing a higher-up, others feel obligated to help and to return the perceived favor or support. The request seems endorsed by authority, which lowers resistance and makes it more likely the target will comply to maintain goodwill or avoid disappointing the supervisor. It’s not primarily about liking someone or about following what many people are doing, nor about scarcity; it’s about the urge to reciprocate and assist someone who appears to have authority behind them. In practice, verify such requests through independent channels rather than acting on the stated authority alone.

Leveraging a superior’s name taps into the reciprocation instinct. When someone signals backing by citing a higher-up, others feel obligated to help and to return the perceived favor or support. The request seems endorsed by authority, which lowers resistance and makes it more likely the target will comply to maintain goodwill or avoid disappointing the supervisor. It’s not primarily about liking someone or about following what many people are doing, nor about scarcity; it’s about the urge to reciprocate and assist someone who appears to have authority behind them. In practice, verify such requests through independent channels rather than acting on the stated authority alone.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy