nerdexam
EC-CouncilEC-Council

212-82 · Question #38

212-82 Question #38: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #38. The question stem and answer options stay visible for context.

Submitted by haru.x· Mar 6, 2026Cloud Security Risks & Threat Mitigation

Question

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options

  • AQuid pro quo
  • BDiversion theft
  • CElicitation
  • DPhishing

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Social Engineering#Quid pro quo#Pretexting
Full 212-82 PracticeBrowse All 212-82 Questions