The attacker's goal is to bypass technical controls by exploiting human psychology: urgency, fear, greed, or curiosity.
The Core Differences in One Line
Social engineering relies on human deception. The SY0-701 exam requires you to differentiate these attacks based on their target scope and level of personalization.
- Phishing: Broad, untargeted attack sent to thousands (Spray and Pray). Low personalization, high volume.
- Spear Phishing: Highly targeted, OSINT-crafted message for a specific person or team. May reference manager name, project, or internal terminology.
- Whaling: Specialized spear phishing aimed exclusively at C-Suite executives (CEO, CFO, Board Members).
- Vishing: Voice-based social engineering — the attacker calls the victim, often impersonating IT support or a bank.
Deep Dive: Anatomy of a Spear Phishing Attack
Unlike generic phishing, spear phishers conduct serious reconnaissance first. They scrape LinkedIn, company websites, GitHub commits, and previous breach data to craft an incredibly convincing email.
Real-World Scenario
An attacker researches the target company on LinkedIn, finds the CFO's name and her direct report in accounting, and learns the company uses Salesforce. They craft an email from 'Salesforce billing' addressing the accounting manager by first name, referencing the CFO's approval, with a link to a fake Salesforce login. The manager enters credentials immediately.

Business Email Compromise (BEC)
Defense-in-Depth vs Phishing Attacks
| Control Type | Implementation | Exam Relevance |
|---|---|---|
| Administrative | Security Awareness Training & Phishing Simulations | Addresses the human element directly. |
| Technical | DMARC, SPF, and DKIM email authentication | Prevents domain spoofing, verifies sender authenticity. |
| Technical | FIDO2 / Hardware Security Keys (YubiKey) | Completely neutralizes credential harvesting from fake login pages. |
| Technical | Email Sandboxing & Link Rewriting | Detonates malicious attachments before they reach the inbox. |
| Administrative | Multi-person approval for wire transfers | Eliminates single-point-of-failure in BEC scenarios. |
- Phishing = mass broadcast. Spear Phishing = targeted individual. Whaling = C-Suite target.
- More specific internal detail in the email = higher confidence it is Spear Phishing.
- BEC (Business Email Compromise) combines whaling with wire fraud — CFO/HR teams are primary targets.
- FIDO2 hardware keys are the only MFA method that cannot be bypassed by AitM proxy attacks.
- DMARC + SPF + DKIM: SPF validates the server, DKIM validates the content, DMARC enforces policy.
Ready to test your knowledge?
Take a free full-length practice exam with 90 questions and instant feedback.
Start Practice Exam