Enhance your Cisco Cyber Security knowledge. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your Cisco Cyber Security Exam with our comprehensive quiz!

Practice this question and more.


What attack method is characterized by an automated phone call masquerading as a legitimate source?

  1. Smishing

  2. Vishing

  3. Phishing

  4. Trojan Horse

The correct answer is: Vishing

The attack method characterized by an automated phone call masquerading as a legitimate source is known as vishing. This form of cyberattack typically involves a voice call—often using techniques such as voice over IP (VoIP)—to impersonate a trusted entity, such as a bank or government agency, in order to deceive the recipient into providing sensitive information, like personal identification, passwords, or credit card details. Vishing relies on social engineering principles, leveraging urgency, fear, or trust to manipulate individuals into compliance. The calls may use spoofed numbers to make it appear as though they are coming from a credible source, increasing the likelihood of the recipient falling victim to the scam. In contrast, smishing refers to phishing attempts conducted through SMS text messages; phishing is an umbrella term for fraudulent attempts to obtain sensitive data via emails; and a Trojan Horse is a type of malicious software disguised as a legitimate file or application. Each of these methods targets different channels and employs distinct tactics, but vishing specifically involves the use of voice communication to deceive individuals.