A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?
Agreed, C is wrong. Unless you are using an attack like evil twin where you force the users to reconnect and potentially steal credentials on wireless. This does not make sense given the question. The most straightforward way to capture creds would be to create a captive portal and send a phishing email or something.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Snagggggin
3 months agohitagitore
3 months, 2 weeks agoSnagggggin
3 months ago