Multiple Choice
A penetration tester is connected to a client's local network and wants to passively identify cleartext protocols and potentially sensitive data being communicated across the network. Which of the following is the BEST approach to take?
A) Run a network vulnerability scan.
B) Run a stress test.
C) Run an MITM attack.
D) Run a port scan.
Correct Answer:

Verified
Correct Answer:
Verified
Q70: While trying to maintain persistence on a
Q71: A penetration tester is scanning a network
Q72: A penetration tester has obtained access to
Q73: A penetration tester observes that several high-numbered
Q74: During a penetration test, a tester identifies
Q76: A client asks a penetration tester to
Q77: A penetration tester used an ASP.NET web
Q78: Consumer-based IoT devices are often less secure
Q79: Which of the following properties of the
Q80: A company contracted a firm specializing in