ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 380 - PT0-002 discussion

Report
Export

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

A.
Wardriving
Answers
A.
Wardriving
B.
Captive portal
Answers
B.
Captive portal
C.
Deauthentication
Answers
C.
Deauthentication
D.
Impersonation
Answers
D.
Impersonation
Suggested answer: D

Explanation:

Impersonation attacks involve the penetration tester assuming the identity of a valid user to gain unauthorized access to systems or information. This method is particularly effective for gathering valid user credentials, as it can involve tactics such as phishing, social engineering, or exploiting weak authentication processes. The other options, such as Wardriving, Captive portal, and Deauthentication, are more focused on wireless network vulnerabilities and are less direct in obtaining user credentials.

asked 02/10/2024
Brandon Walters
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first