PT0-003 · Question #6
PT0-003 Question #6: Real Exam Question with Answer & Explanation
The correct answer is A: Unauthorized access to the network. The collected email addresses (e.g., [email protected], [email protected]) can be used for phishing, spear phishing, or password spraying attacks. These attacks aim to gain unauthorized access to internal systems or user accounts, making this the most immediate and relevant risk.
Question
While conducting a reconnaissance activity, a penetration tester extracts the following information: Emails: - [email protected] - [email protected] - [email protected] Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?
Options
- AUnauthorized access to the network
- BExposure of sensitive servers to the internet
- CLikelihood of SQL injection attacks
- DIndication of a data breach in the company
Explanation
The collected email addresses (e.g., [email protected], [email protected]) can be used for phishing, spear phishing, or password spraying attacks. These attacks aim to gain unauthorized access to internal systems or user accounts, making this the most immediate and relevant risk.
Topics
Community Discussion
No community discussion yet for this question.