nerdexam
EC-CouncilEC-Council

312-50V13 · Question #238

312-50V13 Question #238: Real Exam Question with Answer & Explanation

The correct answer is C: Honey trap. Honey Trap Explained Why C is Correct: Steve used a honey trap, a social engineering technique where an attacker creates an attractive or enticing fake persona (often romantic or appealing) to lure a victim into a relationship, gradually building trust before extracting sensitive

Submitted by lukas.cz· Mar 6, 2026Social Engineering

Question

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Options

  • ADiversion theft
  • BBaiting
  • CHoney trap
  • DPiggybacking

Explanation

Honey Trap Explained

Why C is Correct: Steve used a honey trap, a social engineering technique where an attacker creates an attractive or enticing fake persona (often romantic or appealing) to lure a victim into a relationship, gradually building trust before extracting sensitive information - exactly what Steve did by using an appealing profile to manipulate Stella into revealing company details.

Why the Distractors are Wrong:

  • A. Diversion Theft involves redirecting a delivery or transaction to a different location - no deception of personal relationships is involved.
  • B. Baiting uses a physical or digital lure (like a infected USB drive or free download) to entice victims, not a fabricated romantic/personal relationship.
  • D. Piggybacking is a physical security attack where an unauthorized person gains access to a restricted area by following an authorized person through a secured entry point.

Memory Tip: Think of a "honey trap" like a spider's web coated in honey - the attractive, sweet profile lures the victim in, and by the time they realize they're stuck, sensitive information has already been extracted. If the attack involves an irresistible persona rather than a physical object or location, think honey trap.

Topics

#Social engineering#Honey trap#Online impersonation#Information gathering

Community Discussion

No community discussion yet for this question.

Full 312-50V13 PracticeBrowse All 312-50V13 Questions