easymultiple choiceObjective-mapped

A user forwards an email that says their payroll account will be disabled today unless they click a link and verify their password. The message uses the company logo, but the sender address is from a free webmail domain and the link goes to a look-alike login page. What type of attack is this?

Question 1easymultiple choice
Full question →

A user forwards an email that says their payroll account will be disabled today unless they click a link and verify their password. The message uses the company logo, but the sender address is from a free webmail domain and the link goes to a look-alike login page. What type of attack is this?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Baiting, because the attacker is offering something attractive to lure the user.

Baiting usually relies on a promised reward, free device, or infected media to trigger user action.

B

Best answer

Phishing, because the attacker is using a fraudulent message to steal credentials.

Phishing is the best match because the attacker is sending a deceptive message that impersonates a trusted source and directs the user to a fake login page. The goal is credential theft, and the urgency plus look-alike site are common signs. The sender address and request to verify a password are strong indicators of a phishing attempt.

C

Distractor review

Vishing, because the attacker is trying to trick the user into revealing information.

Vishing is voice phishing, so it uses a phone call rather than an email message and web link.

D

Distractor review

Impersonation, because the attacker is pretending to be someone from the company.

Impersonation describes pretending to be a trusted person, but the attack method here is specifically a deceptive email campaign.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Phishing, because the attacker is using a fraudulent message to steal credentials. — This is phishing because the attacker uses a fraudulent email to pressure the user into clicking a link and entering credentials on a fake site. The free webmail sender, urgency, and look-alike login page are classic warning signs. Security teams should teach users to inspect sender details, hover over links, and report messages that request passwords or create false urgency. Why others are wrong: Baiting is not the best fit because there is no lure such as a free item or infected USB drive. Vishing is phone-based, so it does not apply to an email-and-website scenario. Impersonation is part of the technique, but it is too broad here; phishing is the more precise term for credential theft through a fake email and login page.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.