Free CompTIA PenTest+ PT0-002 Practice Question

During a social engineering attack, an adversary decides to tailor their communication style to match that of their target, trying to establish common ground based on shared hobbies and professional interests. Which principle of influence is the attacker primarily exploiting in this situation?

  • Social proof

  • Reciprocity

  • Likeness

  • Consistency

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot