A penetration tester has been given eight business hours to gain access to a client's financial system. Which of the following techniques will have the HIGHEST likelihood of success?
A.
Attempting to tailgate an employee who is going into the client's workplace
B.
Dropping a malicious USB key with the company's logo in the parking lot
C.
Using a brute-force attack against the external perimeter to gain a foothold
D.
Performing spear phishing against employees by posing as senior management
not A: a tailgate doesn't guarantee to you a client's financial system
not B: can works only if an employee insert the USB key in an internal computer. Who knows if and when do it.
not C: brute-force are slow, could be a good attack only if you are trying to attack a pincode of 4 digits that doesn't consider if you have already wrong pin 3 times.
correct D: You can focus on the target, you can attack in short time and in business times.
I think the issue is which has the "highest likelihood" of success vs "fastest chance" of success. I would say Spearfishing is definitely the fastest but if we are talking about likelihood, bruteforcing seems to be the winner in that dept even if it takes a while. If the company trained their employees than all ABD are all instantly eliminated. They cant protect against C though. It's the way this question is phrased that's throwing folks off.
"external perimeter to gain a foothold"
Re-reading it, even this part has me questioning whether they literally mean external physical perimeter or external network perimeter. This question is bad and so are its answers
Spear Phishing: This method involves sending targeted emails that appear to come from trusted sources, such as senior management, to specific employees. Since these emails can be highly tailored and convincing, they have a higher chance of tricking employees into clicking on malicious links or providing sensitive information quickly.
Attempting to tailgate an employee: While this could provide physical access, it depends on the penetration tester's ability to physically be at the client's location, which may not be feasible within the given time.
Dropping a malicious USB key: This method relies on an employee finding and using the USB key, which may not happen within the eight-hour window. It also depends on the employee bypassing potential security policies that prevent the use of unknown USB devices.
Brute-force attacks against external perimeters can be time-consuming and may not succeed within eight hours due to rate limiting, account lockouts, and other security measures in place.
C is eliminated since it's a technical approach and is met with greater resistance. A, B, and D are easier exploits since they rely on the human element.
A is relatively harder to do than B and C.
C is more likely to be successful since B relies on 1) an employee finding a USB 2) them plugging it in 3) the chances that USB port access is enabled. Answer is D.
D. Performing spear phishing against employees by posing as senior management
Performing spear phishing (Option D) against employees by posing as senior management is likely to have the highest likelihood of success because it targets the weakest link in any security system: the human element. People are often the weakest link in security and can be easily fooled by a well-crafted spear phishing email. Attempting to tailgate an employee (Option A) or dropping a malicious USB key (Option B) in the parking lot may be successful, but they will likely be less effective than a spear phishing attack. A brute-force attack (Option C) against the external perimeter to gain a foothold may also be possible but it is less likely to be successful within eight hours, and also it's a noisy method that will be easily detected.
It doesn't indicate brute-forcing a user's account which performing such a task is unlikely with in a specific 8 hours. For B you have to hope that there is someone even notices the USB and bet on them plugging it in. You never know when a spear phishing attack would work. You rely on your target to open it. Even then, it's not guaranteed the information provided will get you where you need to be. If you're given one time within an 8 hour window, it would be C because it's related to physical security and you choose when to break in. Once you're in you have many options to try to get said financial information.
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ryanzou
Highly Voted 2 years, 7 months agoMeisAdriano
Most Recent 8 months, 3 weeks agoSlick0
9 months, 3 weeks agoSlick0
9 months, 3 weeks agoEtc_Shadow28000
10 months agodeeden
1 year, 1 month agoGazza242
1 year, 3 months ago[Removed]
1 year, 5 months agoSkater_Grace
1 year, 6 months agoIYKMba
1 year, 8 months agocy_analyst
2 years agoRRabbit_111
2 years, 3 months agotoor777
2 years, 3 months agomasso435
2 years, 5 months agopetercorn
2 years, 6 months agopetercorn
2 years, 6 months agoLino_Carbon
2 years, 6 months ago