A penetration tester conducted a discovery scan that generated the following:
Which of the following commands generated the results above and will transform them into a list of active hosts for further analysis?
In this scenario, the penetration tester performed a 'Tailgating' attack (D), where the tester follows closely behind a legitimate employee to gain unauthorized access to a secure area without being noticed. This social engineering technique relies on exploiting human tendencies to be polite or avoid confrontation, rather than using technical hacking methods. The tester engaged the employee in casual conversation to appear less suspicious and took advantage of the situation when the employee, perhaps distracted or feeling socially obliged, held the door open for them.
Chantay
19 days agoKeith
20 days agoJess
23 days agoYvette
1 months agoJame
3 days agoAlpha
9 days agoJacob
10 days agoWalker
1 months agoMarjory
2 days agoJade
9 days agoAudra
10 days agoBenedict
19 days agoSue
22 days agoPedro
2 months agoMozell
2 months agoPedro
2 months ago