SY0-701 · Question #647
SY0-701 Question #647: Real Exam Question with Answer & Explanation
The correct answer is C: Phishing. Phishing (C) is correct because it describes the technique of creating a fraudulent duplicate of a legitimate site (in this case, a company email portal) to trick users into entering their credentials - a classic phishing attack known as a "spoofed site" or "clone phishing." Impe
Question
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
Options
- AImpersonation
- BReplication
- CPhishing
- DSmishing
Explanation
Phishing (C) is correct because it describes the technique of creating a fraudulent duplicate of a legitimate site (in this case, a company email portal) to trick users into entering their credentials - a classic phishing attack known as a "spoofed site" or "clone phishing."
Impersonation (A) is broader and typically refers to someone pretending to be another person or authority figure directly (e.g., calling an employee while posing as IT support), not creating a fake website. Replication (B) is a legitimate IT process (copying data/services across systems for redundancy) - it has no malicious connotation in security contexts. Smishing (D) is phishing conducted specifically via SMS text messages, not through a duplicate website.
Memory tip: Think "phishing = phake websites" - whenever you see a fraudulent lookalike site designed to harvest credentials, that's phishing. If it's via text, add the "S" for SMS → smishing.
Topics
Community Discussion
No community discussion yet for this question.