How do social engineers and phishers obtain the information they need to plan an attack? A. Stealing your computer or mobile phone.
B. Viewing a company’s website or social media site.
C. Asking victims seemingly innocent questions while posing as a trustworthy individual.
D. Tricking victims into downloading malware or logging into fake websites.
The correct answer is C. Asking victims seemingly innocent questions while posing as a trustworthy individual.
Explanation: Social engineers often use techniques like pretexting, where they pretend to be someone else, to extract personal information from victims. This method allows them to gather sensitive information which they can use to plan their attacks. While options B and D also represent strategies used in phishing and social engineering, C specifically highlights the direct interaction with victims to gain their trust and information.