Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of manipulation is being used when a threat actor pretends to be someone else to deceive an individual into sharing confidential information?

  1. Phishing

  2. Impersonation

  3. Social Engineering

  4. Eavesdropping

The correct answer is: Impersonation

Impersonation is the act of a threat actor pretending to be another individual or entity to deceive a target into divulging confidential information. This tactic is effective because the attacker leverages the trust associated with the assumed identity, making it easier to manipulate the victim. This technique can encompass various scenarios, such as posing as a co-worker, a representative from a legitimate organization, or even a family member, ultimately aimed at gaining sensitive information. While phishing typically involves fraudulent communications, such as emails that appear to come from legitimate sources to trick recipients into providing personal data, it is more focused on digital channels. Social engineering is a broader term that encompasses various manipulative tactics, including impersonation and phishing, aimed at psychologically manipulating individuals to gain confidential information. Eavesdropping refers to unauthorized listening to private conversations or communications, which does not involve impersonation. Thus, the specific act of pretension to deceive and manipulate for information aligns closely with the definition of impersonation, making it the most fitting answer in this scenario.