Exam4Training

Which of the following BEST describes this attack?

A penetration tester discovered that a client uses cloud mail as the company’s email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue.

Which of the following BEST describes this attack?
A . Credential harvesting
B . Privilege escalation
C . Password spraying
D . Domain record abuse

Answer: A

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version