Register
5:00
Stop
CEH - Footprinting and Reconnaissance - Footprinting through Social Engineering
Advanced
1/5
Scenario: You have been hired to assess the security posture of EnergyTech Corp, a power utility company. You need to gather information about their infrastructure and security awareness level before testing their defenses. While researching online, you discover they're hosting a public job fair next week where IT managers will be present. What social engineering footprinting approach would be most effective and least likely to raise suspicions?
a.
Call the company's main help desk claiming to be a new employee who needs immediate access to specific servers and network diagrams for an urgent project
b.
Send phishing emails to employees pretending to be from IT security conducting a mandatory security assessment requiring system information
c.
Create a fake LinkedIn profile as an IT security consultant and connect with several employees, then message them surveys about their security protocols
d.
Attend the job fair posing as a qualified job seeker and ask targeted questions about systems, networks, and remote work policies during interviews
Advanced