nerdexam
CompTIACompTIA

SY0-701 · Question #647

SY0-701 Question #647: Real Exam Question with Answer & Explanation

The correct answer is C: Phishing. Phishing (C) is correct because it describes the technique of creating a fraudulent duplicate of a legitimate site (in this case, a company email portal) to trick users into entering their credentials - a classic phishing attack known as a "spoofed site" or "clone phishing." Impe

Submitted by lukas.cz· Mar 6, 2026Threats, vulnerabilities, and mitigations

Question

A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?

Options

  • AImpersonation
  • BReplication
  • CPhishing
  • DSmishing

Explanation

Phishing (C) is correct because it describes the technique of creating a fraudulent duplicate of a legitimate site (in this case, a company email portal) to trick users into entering their credentials - a classic phishing attack known as a "spoofed site" or "clone phishing."

Impersonation (A) is broader and typically refers to someone pretending to be another person or authority figure directly (e.g., calling an employee while posing as IT support), not creating a fake website. Replication (B) is a legitimate IT process (copying data/services across systems for redundancy) - it has no malicious connotation in security contexts. Smishing (D) is phishing conducted specifically via SMS text messages, not through a duplicate website.

Memory tip: Think "phishing = phake websites" - whenever you see a fraudulent lookalike site designed to harvest credentials, that's phishing. If it's via text, add the "S" for SMS → smishing.

Topics

#Phishing#Social Engineering#Threats

Community Discussion

No community discussion yet for this question.

Full SY0-701 PracticeBrowse All SY0-701 Questions