A penetration tester discovers a file, key.enc. on a shared drive and then executes the following command, which yields the following output:
Which of the following are the best recommendations for the penetration tester to suggest? (Select two).
Limited Time Offer
25%
Off
Jeanice
4 days agoTawna
6 days agoPortia
10 days agoRamonita
13 days ago