List of questions
Related questions
Question 380 - PT0-002 discussion
A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?
A.
Wardriving
B.
Captive portal
C.
Deauthentication
D.
Impersonation
Your answer:
0 comments
Sorted by
Leave a comment first