exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 221 discussion

Actual exam question from CompTIA's PT0-002
Question #: 221
Topic #: 1
[All PT0-002 Questions]

A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?

  • A. Credential harvesting
  • B. Privilege escalation
  • C. Password spraying
  • D. Domain record abuse
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
pepgua
5 months ago
The MOST correct answer to describe this attack is: A. Credential harvesting Credential harvesting is the act of tricking users into revealing their login credentials, often through phishing emails or fake login pages. In this case, the penetration tester is attempting to steal employees' cloud mail login credentials by creating a fake login page that appears legitimate.
upvoted 1 times
...
nickwen007
1 year, 8 months ago
Password spraying is a technique used to try guess a user's password by using a list of commonly used passwords. The list is usually generated from publicly available sources or from other data breaches. The attacker makes multiple attempts at a single user account with different passwords in an attempt to gain access. It is a common attack vector for criminals and should be guarded against with strong password creation and regular monitoring of accounts.
upvoted 1 times
...
nickwen007
1 year, 8 months ago
Credential harvesting involves using a variety of tactics including phishing, malware, bruteforce attacks, keylogging, and more. These tactics are used to acquire usernames, passwords, financial information, and other sensitive data that can be used to gain access to accounts or other information. As such, it is important to practice good online safety habits, such as strong password creation and monitoring of accounts.
upvoted 3 times
[Removed]
1 year, 8 months ago
A is correct
upvoted 2 times
...
...
cy_analyst
1 year, 8 months ago
Selected Answer: A
The penetration tester created a fake login page to trick the company's employees into entering their email credentials, which were then harvested by the tester. This type of attack is commonly referred to as phishing, and it is a common tactic used by attackers to gain access to sensitive information.
upvoted 4 times
[Removed]
1 year, 8 months ago
Wha you think about question 78?
upvoted 1 times
...
...
[Removed]
1 year, 8 months ago
A is correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago