Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-701 topic 1 question 6 discussion

Actual exam question from CompTIA's SY0-701
Question #: 6
Topic #: 1
[All SY0-701 Questions]

Which of the following scenarios describes a possible business email compromise attack?

  • A. An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
  • B. Employees who open an email attachment receive messages demanding payment in order to access files.
  • C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
  • D. An employee receives an email with a link to a phishing site that is designed to look like the company’s email portal.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lauren2wright
Highly Voted 2 months ago
C. In a BEC attack, the attacker typically impersonates a high-ranking executive or authority figure within the organization and requests sensitive information or actions from employees. In this case, the HR director is requesting log-in credentials for a cloud administrator account, which is a classic example of BEC where the attacker seeks to gain access to privileged accounts through deception.
upvoted 14 times
...
chadbigman
Most Recent 1 week, 4 days ago
Common Types of BEC Attacks: CEO Fraud: The attacker impersonates a high-ranking executive, instructing an employee to transfer funds to a fraudulent account.
upvoted 1 times
...
Selected Answer: C
Option A describes an executive whaling attack Option B describes a ransomware attack Option D describes a phishing attack to harvest credentials Option C describes a BEC attack. Business email compromise (BEC) attacks involve an attacker gaining access to a legitimate business email account or impersonating a trusted figure within an organization to deceive employees into taking actions that compromise security. The service desk employee received an email from the legitimate HR director account. This means the HR director's email account has been compromised, and the attacker is attempting to access sensitive information by requesting login credentials from the service desk employee.
upvoted 2 times
TheMichael
1 week, 2 days ago
The answer is A. A whaling attack is also referred to as a Business Email Compromise attack (BEC).
upvoted 1 times
...
...
Etc_Shadow28000
3 weeks, 6 days ago
Selected Answer: C
A business email compromise (BEC) attack typically involves an attacker impersonating a legitimate business email account to deceive an organization or its employees into making unauthorized transactions or divulging sensitive information. A. - This is a common form of BEC, where the attacker impersonates an executive to request a gift card purchase or other financial action. B. - This describes a ransomware attack, not a BEC. Ransomware typically encrypts files and demands a ransom for decryption. C. - This scenario is a BEC attack, where the attacker impersonates an HR director to gain sensitive credentials. D. - This describes a phishing attack. While phishing can be part of a BEC attack, it is not a BEC attack itself unless it involves the specific impersonation and fraudulent intent typically seen in BEC. The scenario that best describes a possible business email compromise attack is: C.
upvoted 2 times
Gigi42
6 hours, 33 minutes ago
So by your reasoning both A and C are BEC?
upvoted 1 times
...
...
Gadoof
1 month ago
It's A because THE Classic BEC attack comes in the form of an attacker emailing an internal asking for them to purchase gift cards with the company debit card for a 'future meeting that they don't have time to handle.' This is a scam as it's not really the CFO or whoever and they'll ask you to leave the gift cards 'outside' or somewhere where the attacker can take them. It's also so low in monetary value that nobody cares to investigate, thus enabling the attackers to continue operating with impunity. C is way more than a BEC.
upvoted 2 times
kinny4000
4 weeks, 1 day ago
A does not qualify as a BEC, it's just a regular phishing attack. In option C, the email could actually be compromised because it came from the legitimate HR director's address, suggesting that their email has been compromised.
upvoted 1 times
...
...
MahiMahiMahi
1 month ago
Selected Answer: C
C for sure, anyone can look up an executives name but receiving an email from the actual HR director's email address and not a look alike is a bigger threat.
upvoted 1 times
...
Boats
1 month, 1 week ago
Selected Answer: C
C is the correct answer. A is a close second but beware the wording on this one. Answer A indicates this is a spoofed account while answer C appears to be an actual compromise of the HR directors email where an attacker has control.
upvoted 2 times
...
MAKOhunter33333333
1 month, 1 week ago
Selected Answer: A
Everywhere I read from credible online sources like FBI, CloudFlare, Cisco, etc., state that BEC is financially motivated and is the main goal, not compromising credentials. Professor Messer even mentions financial fraud.
upvoted 2 times
edmondme
1 month ago
i think you are right in your answer, C is more like credential harvesting and not a BEC attack
upvoted 1 times
...
...
Lanka22
1 month, 1 week ago
Selected Answer: C
Obviously, it's C Why does HR need a Cloud Admin Password
upvoted 1 times
...
oluabi.salami
1 month, 2 weeks ago
BEC is a mail seeming to have come from a known identifiable colleague. C is right.
upvoted 1 times
...
Abcd123321
1 month, 3 weeks ago
Selected Answer: C
Business Email Compromise (BEC) ● Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker ● Taking over a legitimate business email accounts through social engineering or cyber intrusion techniques to conduct unauthorized fund transfers, redirect payments, or steal sensitive information
upvoted 1 times
...
hasquaati
1 month, 3 weeks ago
Selected Answer: C
C for me on this one. A could possibly be a BEC, however the attacker is only impersonating the "Name" of the CEO, where as the HR Director has had his/her email actually compromised.
upvoted 1 times
...
shady23
1 month, 3 weeks ago
Selected Answer: A
A. An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
upvoted 1 times
...
AutoroTink
1 month, 3 weeks ago
Selected Answer: C
While the scenario in option A could be part of a broader phishing or social engineering attempt, it does not specifically align with the typical methods and objectives of a BEC attack, which is why option C is a more fitting example of a BEC scenario.
upvoted 1 times
...
cri88
1 month, 3 weeks ago
Selected Answer: C
C is the right one
upvoted 1 times
...
rjbb
1 month, 3 weeks ago
Selected Answer: C
The answer is C, the question states - "Which of the following scenarios describes a possible business email compromise attack" This implies that someone in the business has had their email COMPROMISED, IE - the threat actor is using their email to impersonate them. So the solution should be C, as they are using the HR Directors email to log in to a cloud admin account.
upvoted 1 times
...
Xavierallen9711
1 month, 3 weeks ago
Selected Answer: C
I’d say C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in