ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 89 - PT0-002 discussion

Report
Export

In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers. Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?

A.
Test for RFC-defined protocol conformance.
Answers
A.
Test for RFC-defined protocol conformance.
B.
Attempt to brute force authentication to the service.
Answers
B.
Attempt to brute force authentication to the service.
C.
Perform a reverse DNS query and match to the service banner.
Answers
C.
Perform a reverse DNS query and match to the service banner.
D.
Check for an open relay configuration.
Answers
D.
Check for an open relay configuration.
Suggested answer: D

Explanation:

SMTP is a protocol associated with mail servers. Therefore, for a penetration tester, an open relay configuration can be exploited to launch phishing attacks.

asked 02/10/2024
Katherin Aragon Calderon
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first