exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 270 discussion

Actual exam question from CompTIA's PT0-002
Question #: 270
Topic #: 1
[All PT0-002 Questions]

In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers.

Which of the following actions would best enable the tester to perform phishing in a later stage of the assessment?

  • A. Test for RFC-defined protocol conformance.
  • B. Attempt to brute force authentication to the service.
  • C. Perform a reverse DNS query and match to the service banner.
  • D. Check for an open relay configuration.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Etc_Shadow28000
9 months, 3 weeks ago
Selected Answer: D
D. Check for an open relay configuration: An open relay SMTP server allows anyone on the internet to send email through it without authentication. This is a significant vulnerability that can be exploited to send phishing emails. By identifying and exploiting an open relay, the penetration tester can use the SMTP server to send phishing emails in later stages of the assessment. Explanation: A. Test for RFC-defined protocol conformance: While important for understanding how the SMTP service adheres to standards, it doesn’t directly contribute to enabling phishing activities. B. Attempt to brute force authentication to the service: This might help in gaining unauthorized access to the SMTP server, but it is not specifically aimed at enabling phishing. C. Perform a reverse DNS query and match to the service banner: This helps in identifying the legitimacy and configuration of the SMTP server, but it doesn’t facilitate phishing.
upvoted 1 times
...
041ba31
1 year, 1 month ago
Selected Answer: D
An open relay configuration allows anyone to send emails through the server without authentication, making it an ideal setup for phishing campaigns. Therefore, checking for an open relay configuration would best enable the penetration tester to perform phishing in a later stage of the assessment.
upvoted 3 times
outnumber_gargle024
11 months ago
thanks king
upvoted 1 times
...
...
LiveLaughToasterBath
1 year, 2 months ago
Selected Answer: D
From hpe.com: SMTP Open Mail Relay vulnerability, is basically telling you that someone else, from another network is able to send mail using your SMTP server, so outsiders are able to for example, send spam through your server.
upvoted 1 times
...
duckduckgooo
1 year, 4 months ago
Selected Answer: D
D would be handy later :-)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago