Multiple Choice
During a security assessment, activities were divided into two phases: internal and external exploitation. The security assessment team set a hard time limit on external activities before moving to a compromised box within the enterprise perimeter. Which of the following methods is the assessment team most likely to employ NEXT?
A) Pivoting from the compromised, moving laterally through the enterprise, and trying to exfiltrate data and compromise devices.
B) Conducting a social engineering attack attempt with the goal of accessing the compromised box physically.
C) Exfiltrating network scans from the compromised box as a precursor to social media reconnaissance
D) Open-source intelligence gathering to identify the network perimeter and scope to enable further system compromises.
Correct Answer:

Verified
Correct Answer:
Verified
Q96: A regional transportation and logistics company recently
Q97: A recent overview of the network's security
Q98: A cybersecurity consulting company supports a diverse
Q99: A security architect is determining the best
Q100: A security consultant is improving the physical
Q102: A systems administrator recently joined an organization
Q103: A medical facility wants to purchase mobile
Q104: A secure facility has a server room
Q105: A security researcher is gathering information about
Q106: A company has gone through a round