List of questions
Related questions
Question 280 - PT0-002 discussion
Company.com has hired a penetration tester to conduct a phishing test. The tester wants to set up a fake log-in page and harvest credentials when target employees click on links in a phishing email.
Which of the following commands would best help the tester determine which cloud email provider the log-in page needs to mimic?
A.
dig company.com MX
B.
whois company.com
C.
cur1 www.company.com
D.
dig company.com A
Your answer:
0 comments
Sorted by
Leave a comment first