CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration testing engagement, you have been tasked with assessing the susceptibility of employees to phishing attacks. Drawing upon the principles of influence, you decide to craft an email that will appear urgent, persuading recipients to click on a link to update their password immediately. The email will warn the recipients about a series of unauthorized login attempts detected on their accounts. Which method of influence best describes this tactic?

  • Scarcity

  • Social proof

  • Authority

  • Urgency

This question is for objective:
Attacks and Exploits
Your Score:
Attacks and Exploits
Information Gathering and Vulnerability Scanning
Reporting and Communication
Tools and Code Analysis
Planning and Scoping