Suggested Answer:A🗳️
Ethical hackers use the same methods and techniques, including those that have the potential of exploiting vulnerabilities, to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. References: http://searchsecurity.techtarget.com/definition/ethical-hacker
Disagree. A states ' have the potential of exploiting vulnerabilities'. This suggests the attacker shoudn't try and run mimikatz just because it has the potential to get the hashes, which is the whole point of a pen test. D is correct - you shouldn't write or modify company systems that could cause changes in business continuity
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.312-50 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aids00123
11 months, 1 week ago