🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 50 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

While performing external reconnaissance, you telephone several employees of a target company claiming to be a new HR intern who is "verifying the staff directory." You ask for full names, job titles, and internal extension numbers so you can later craft spear-phishing emails. Which social-engineering approach are you using, and why is it especially valuable during the footprinting phase of an engagement?

  • Phishing; it uses deceptive emails to deliver malicious links that capture user credentials for later exploitation

  • Pretexting; it leverages a fabricated role to convince targets to release internal contact details critical for mapping the organization

  • Baiting; it relies on physical media loaded with malware to entice employees into compromising internal systems

  • Quid pro quo; it offers a benefit in exchange for sensitive information, forcing employees to perform unauthorized actions

Certified Ethical Hacker (CEH)
Reconnaissance Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot