exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 22 discussion

Actual exam question from CompTIA's PT0-002
Question #: 22
Topic #: 1
[All PT0-002 Questions]

A penetration tester has been given eight business hours to gain access to a client's financial system.
Which of the following techniques will have the HIGHEST likelihood of success?

  • A. Attempting to tailgate an employee who is going into the client's workplace
  • B. Dropping a malicious USB key with the company's logo in the parking lot
  • C. Using a brute-force attack against the external perimeter to gain a foothold
  • D. Performing spear phishing against employees by posing as senior management
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ryanzou
Highly Voted 2 years, 7 months ago
Selected Answer: D
I think D is correct
upvoted 9 times
...
MeisAdriano
Most Recent 8 months, 3 weeks ago
Selected Answer: D
not A: a tailgate doesn't guarantee to you a client's financial system not B: can works only if an employee insert the USB key in an internal computer. Who knows if and when do it. not C: brute-force are slow, could be a good attack only if you are trying to attack a pincode of 4 digits that doesn't consider if you have already wrong pin 3 times. correct D: You can focus on the target, you can attack in short time and in business times.
upvoted 1 times
...
Slick0
9 months, 3 weeks ago
Selected Answer: C
I think the issue is which has the "highest likelihood" of success vs "fastest chance" of success. I would say Spearfishing is definitely the fastest but if we are talking about likelihood, bruteforcing seems to be the winner in that dept even if it takes a while. If the company trained their employees than all ABD are all instantly eliminated. They cant protect against C though. It's the way this question is phrased that's throwing folks off.
upvoted 2 times
Slick0
9 months, 3 weeks ago
"external perimeter to gain a foothold" Re-reading it, even this part has me questioning whether they literally mean external physical perimeter or external network perimeter. This question is bad and so are its answers
upvoted 1 times
...
...
Etc_Shadow28000
10 months ago
Selected Answer: D
Spear Phishing: This method involves sending targeted emails that appear to come from trusted sources, such as senior management, to specific employees. Since these emails can be highly tailored and convincing, they have a higher chance of tricking employees into clicking on malicious links or providing sensitive information quickly. Attempting to tailgate an employee: While this could provide physical access, it depends on the penetration tester's ability to physically be at the client's location, which may not be feasible within the given time. Dropping a malicious USB key: This method relies on an employee finding and using the USB key, which may not happen within the eight-hour window. It also depends on the employee bypassing potential security policies that prevent the use of unknown USB devices. Brute-force attacks against external perimeters can be time-consuming and may not succeed within eight hours due to rate limiting, account lockouts, and other security measures in place.
upvoted 1 times
...
deeden
1 year, 1 month ago
Selected Answer: D
I agree with option D, humans can be the weakest in most cases.
upvoted 1 times
...
Gazza242
1 year, 3 months ago
I go with D
upvoted 1 times
...
[Removed]
1 year, 5 months ago
Selected Answer: D
C is eliminated since it's a technical approach and is met with greater resistance. A, B, and D are easier exploits since they rely on the human element. A is relatively harder to do than B and C. C is more likely to be successful since B relies on 1) an employee finding a USB 2) them plugging it in 3) the chances that USB port access is enabled. Answer is D.
upvoted 2 times
...
Skater_Grace
1 year, 6 months ago
Selected Answer: D
I will go with D. Phishing is still the most effective method of gaining initial access. Human factor is the weakest link in cyber security.
upvoted 1 times
...
IYKMba
1 year, 8 months ago
D will get the tester faster result
upvoted 1 times
...
cy_analyst
2 years ago
Selected Answer: D
By posing as senior management, the attacker can use their authority to convince employees to take actions that could lead to unauthorized access.
upvoted 2 times
...
RRabbit_111
2 years, 3 months ago
Selected Answer: D
D. Performing spear phishing against employees by posing as senior management Performing spear phishing (Option D) against employees by posing as senior management is likely to have the highest likelihood of success because it targets the weakest link in any security system: the human element. People are often the weakest link in security and can be easily fooled by a well-crafted spear phishing email. Attempting to tailgate an employee (Option A) or dropping a malicious USB key (Option B) in the parking lot may be successful, but they will likely be less effective than a spear phishing attack. A brute-force attack (Option C) against the external perimeter to gain a foothold may also be possible but it is less likely to be successful within eight hours, and also it's a noisy method that will be easily detected.
upvoted 4 times
...
toor777
2 years, 3 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
masso435
2 years, 5 months ago
Selected Answer: C
It doesn't indicate brute-forcing a user's account which performing such a task is unlikely with in a specific 8 hours. For B you have to hope that there is someone even notices the USB and bet on them plugging it in. You never know when a spear phishing attack would work. You rely on your target to open it. Even then, it's not guaranteed the information provided will get you where you need to be. If you're given one time within an 8 hour window, it would be C because it's related to physical security and you choose when to break in. Once you're in you have many options to try to get said financial information.
upvoted 2 times
...
petercorn
2 years, 6 months ago
Selected Answer: D
8 business hours not enough to brute-force attack
upvoted 4 times
petercorn
2 years, 6 months ago
Composition of the password Hack duration 4 to 11 digits Instant 12 digits 2 seconds 15 digits 32 minutes 10 characters (complex) 5 months 18 characters (uppercase + lowercase + numbers and symbols) 438 trillion years
upvoted 5 times
...
...
Lino_Carbon
2 years, 6 months ago
I think D too
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago