mediummultiple choiceObjective-mapped

A security analyst receives an alert from the email security gateway about a message sent to an employee. The email has an attachment named 'Invoice_Q4_2024.exe'. The employee claims they did not open the attachment, and the email appears to come from a known vendor's domain but the sender address has a slight typo. Which type of attack is most likely being attempted?

Question 1mediummultiple choice
Full question →

A security analyst receives an alert from the email security gateway about a message sent to an employee. The email has an attachment named 'Invoice_Q4_2024.exe'. The employee claims they did not open the attachment, and the email appears to come from a known vendor's domain but the sender address has a slight typo. Which type of attack is most likely being attempted?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Spear phishing

Spear phishing is a targeted version of phishing aimed at a specific individual or organization. While the email is sent to an employee, the question does not provide evidence of tailored content or reconnaissance, so the broader category 'phishing' is more appropriate.

B

Best answer

Phishing

Phishing is a social engineering attack that uses deceptive emails and malicious attachments to trick recipients into executing malware or revealing sensitive information. The typo-squatted sender address and executable attachment are classic indicators of a phishing attempt.

C

Distractor review

Smishing

Smishing (SMS phishing) uses text messages rather than email. Since the attack vector is email, smishing does not apply.

D

Distractor review

Vishing

Vishing (voice phishing) uses phone calls or voicemail messages. The attack described involves an email attachment, so vishing is not correct.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Phishing — This scenario describes a phishing attack that uses a malicious executable disguised as a business document. The typo in the sender address indicates email spoofing, and the .exe attachment is a common vector for malware delivery. Spear phishing targets specific individuals, but the term 'phishing' broadly covers the use of deceptive emails and malicious attachments. Smishing is SMS-based, and vishing is voice-based. Thus, the correct answer is phishing.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.