During a security assessment, activities were divided into two phases: internal and external exploitation. The security assessment team set a hard time limit on external activities before moving to a compromised box within the enterprise perimeter. Which of the following methods is the assessment team most likely to employ NEXT?
A) Pivoting from the compromised, moving laterally through the enterprise, and trying to exfiltrate data and compromise devices.
B) Conducting a social engineering attack attempt with the goal of accessing the compromised box physically.
C) Exfiltrating network scans from the compromised box as a precursor to social media reconnaissance
D) Open-source intelligence gathering to identify the network perimeter and scope to enable further system compromises.
Correct Answer:
Verified
Q185: The Chief Information Officer (CIO) wants to
Q186: Engineers at a company believe a certain
Q187: Following a merger, the number of remote
Q188: An internal staff member logs into an
Q189: A security engineer is performing an assessment
Q191: A security analyst has requested network engineers
Q192: Company.org has requested a black-box security assessment
Q193: A managed service provider is designing a
Q194: Given the following information about a company's
Q195: A security technician is incorporating the following
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents