A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
A) Escalation of privilege
B) SQL injection
C) Active reconnaissance
D) Proxy server
Correct Answer:
Verified
Q224: Which of the following allows an auditor
Q225: A security administrator wants to configure a
Q226: A wireless network has the following design
Q227: A security analyst is investigating a security
Q228: A network administrator adds an ACL to
Q230: A security analyst is working on a
Q231: A security analyst is updating a BIA
Q232: A security engineer wants to implement a
Q233: While performing a penetration test, the technicians
Q234: Which of the following BEST describes a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents