mediummultiple choiceObjective-mapped

A help desk technician receives a phone call from someone who claims to be the CFO. The caller knows the executive team structure, says they are traveling, and insists the technician reset MFA to 'avoid delaying a wire transfer.' Which social engineering technique is the caller primarily using?

Question 1mediummultiple choice
Full question →

A help desk technician receives a phone call from someone who claims to be the CFO. The caller knows the executive team structure, says they are traveling, and insists the technician reset MFA to 'avoid delaying a wire transfer.' Which social engineering technique is the caller primarily using?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Pretexting, because the caller builds a believable story to manipulate the employee

Pretexting is the best fit because the attacker invents a convincing scenario, uses insider details, and pressures the technician to bypass normal verification. The goal is not just to trick someone into clicking a link, but to create a false identity and narrative that makes the request seem legitimate. This is a common tactic in help desk fraud and account takeover attempts.

B

Distractor review

Baiting, because the caller is offering something valuable in exchange for action

Baiting usually involves an enticing object or promise, such as a free download, gift, or infected USB drive, rather than a fabricated identity over the phone.

C

Distractor review

Vishing, because the attack happens by voice call

Vishing does describe phishing over a phone call, but the question asks for the primary technique. The defining tactic here is the fabricated story and identity.

D

Distractor review

Smishing, because the attacker is using a mobile device

Smishing is phishing by text message. This scenario uses a voice call, not SMS or messaging.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Pretexting, because the caller builds a believable story to manipulate the employee — Pretexting is the correct answer because the caller is using a crafted story, organizational knowledge, and urgency to persuade the help desk to violate normal verification procedures. In real workplaces, attackers often combine pretexting with impersonation to obtain MFA resets, password changes, or privileged access. The social engineering element is the invented situation, not merely the phone channel itself. Why others are wrong: Baiting is about luring a target with something tempting, not about impersonating an executive. Vishing is a channel description, but it does not capture the core tactic as precisely as pretexting. Smishing is text-message based, so it does not fit a voice call. The scenario is about manipulating trust through a fabricated narrative.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.