-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CompTIA PenTest+ Study Guide
By :
You can find the answers in the Appendix.
Cynthia wants to use a phishing attack to acquire credentials belonging to the senior leadership of her target. What type of phishing attack should she use?
Mike wants to enter an organization’s high-security data center. Which of the following techniques is most likely to stop his tailgating attempt?
Which of the following technologies is most resistant to badge cloning attacks if implemented properly?
Use the following scenario for questions 4, 5, and 6.
Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does...
Change the font size
Change margin width
Change background colour