Julia used which principle of social engineering when she posed as an IT technician and obtained credentials?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

Julia used which principle of social engineering when she posed as an IT technician and obtained credentials?

Explanation:
Reciprocation is the social engineering principle at play here: people tend to repay a favor or kindness. By posing as an IT technician and offering help, Julia creates a perceived benefit for the target. That sense of having received assistance makes the target feel obliged to return the favor, which in this context can mean sharing credentials or granting access. The tactic hinges on that subtle sense of indebtedness rather than on popularity (social validation), rapport (friendship/liking), or scarcity.

Reciprocation is the social engineering principle at play here: people tend to repay a favor or kindness. By posing as an IT technician and offering help, Julia creates a perceived benefit for the target. That sense of having received assistance makes the target feel obliged to return the favor, which in this context can mean sharing credentials or granting access. The tactic hinges on that subtle sense of indebtedness rather than on popularity (social validation), rapport (friendship/liking), or scarcity.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy