In social engineering training, which principle was demonstrated when an attacker leverages a superior's name to obtain credentials?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

In social engineering training, which principle was demonstrated when an attacker leverages a superior's name to obtain credentials?

Explanation:
Leveraging a superior’s name taps into the reciprocation instinct. When someone signals backing by citing a higher-up, others feel obligated to help and to return the perceived favor or support. The request seems endorsed by authority, which lowers resistance and makes it more likely the target will comply to maintain goodwill or avoid disappointing the supervisor. It’s not primarily about liking someone or about following what many people are doing, nor about scarcity; it’s about the urge to reciprocate and assist someone who appears to have authority behind them. In practice, verify such requests through independent channels rather than acting on the stated authority alone.

Leveraging a superior’s name taps into the reciprocation instinct. When someone signals backing by citing a higher-up, others feel obligated to help and to return the perceived favor or support. The request seems endorsed by authority, which lowers resistance and makes it more likely the target will comply to maintain goodwill or avoid disappointing the supervisor. It’s not primarily about liking someone or about following what many people are doing, nor about scarcity; it’s about the urge to reciprocate and assist someone who appears to have authority behind them. In practice, verify such requests through independent channels rather than acting on the stated authority alone.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy