Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 4 Question 56 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 56
Topic #: 4
[All PT0-002 Questions]

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

Show Suggested Answer Hide Answer
Suggested Answer: D

Impersonation attacks involve the penetration tester assuming the identity of a valid user to gain unauthorized access to systems or information. This method is particularly effective for gathering valid user credentials, as it can involve tactics such as phishing, social engineering, or exploiting weak authentication processes. The other options, such as Wardriving, Captive portal, and Deauthentication, are more focused on wireless network vulnerabilities and are less direct in obtaining user credentials.


Contribute your Thoughts:

Virgilio
5 months ago
I agree with Impersonation feels like the most direct way.
upvoted 0 times
...
Lenora
6 months ago
Wardriving isn't relevant here. Definitely not A.
upvoted 0 times
...
Felton
6 months ago
I think captive portal can be used effectively too. Like B option.
upvoted 0 times
...
Yuriko
6 months ago
Impersonation sounds valid. But deauthentication is strong too. C could work.
upvoted 0 times
...
Kate
6 months ago
Yeah, exactly. I think the best option might be impersonation. D, right?
upvoted 0 times
...
Hassie
6 months ago
This question seems tricky. Gather valid user credentials?
upvoted 0 times
...

Save Cancel