List of questions
Related questions
Question 276 - PT0-002 discussion
After compromising a system, a penetration tester wants more information in order to decide what actions to take next. The tester runs the following commands:
Which of the following attacks is the penetration tester most likely trying to perform?
A.
Metadata service attack
B.
Container escape techniques
C.
Credential harvesting
D.
Resource exhaustion
Your answer:
0 comments
Sorted by
Leave a comment first