List of questions
Related questions
Question 562 - 312-50v12 discussion
A penetration tester is performing an enumeration on a client's network. The tester has acquired permission to perform enumeration activities. They have identified a remote inter-process communication (IPC) share and are trying to collect more information about it. The tester decides to use a common enumeration technique to collect the desired data. Which of the following techniques would be most appropriate for this scenario?
A.
Brute force Active Directory
B.
Probe the IPC share by attempting to brute force admin credentials
C.
Extract usernames using email IDs
D.
Conduct a DNS zone transfer
Your answer:
0 comments
Sorted by
Leave a comment first