Prepare for your Ethical Hacking Essentials Test. Study with flashcards and multiple choice questions with detailed hints and explanations. Enhance your cybersecurity skills and get ready for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of manipulation is being used when a threat actor pretends to be someone else to deceive an individual into sharing confidential information?

  1. Phishing

  2. Impersonation

  3. Social Engineering

  4. Eavesdropping

The correct answer is: Impersonation

Impersonation is the act of a threat actor pretending to be another individual or entity to deceive a target into divulging confidential information. This tactic is effective because the attacker leverages the trust associated with the assumed identity, making it easier to manipulate the victim. This technique can encompass various scenarios, such as posing as a co-worker, a representative from a legitimate organization, or even a family member, ultimately aimed at gaining sensitive information. While phishing typically involves fraudulent communications, such as emails that appear to come from legitimate sources to trick recipients into providing personal data, it is more focused on digital channels. Social engineering is a broader term that encompasses various manipulative tactics, including impersonation and phishing, aimed at psychologically manipulating individuals to gain confidential information. Eavesdropping refers to unauthorized listening to private conversations or communications, which does not involve impersonation. Thus, the specific act of pretension to deceive and manipulate for information aligns closely with the definition of impersonation, making it the most fitting answer in this scenario.