adplus-dvertising
frame-decoration

Question

Beth recently conducted a phishing attack against a penetration testing target in an attempt to gather credentials that she might use in later attacks. What stage of the penetration testing process is Beth in?

a.

Planning and Scoping

b.

Attacking and Exploiting

c.

Information Gathering and Vulnerability Scanning

d.

Reporting and Communication

Answer: (b).Attacking and Exploiting Explanation:While Beth is indeed gathering information during a phishing attack, she is conducting an active social engineering attack. This moves beyond the activities of Information Gathering and Vulnerability Scanning and moves into the realm of Attacking and Exploiting.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Beth recently conducted a phishing attack against a penetration testing target in an attempt to gather credentials that she might use in later attacks. What stage of the...

Similar Questions

Discover Related MCQs

Q. Which one of the following security assessment tools is not commonly used during the Information Gathering and Vulnerability Scanning phase of a penetration test?

Q. During what phase of the Cyber Kill Chain does an attacker steal information, use computing resources, or alter information without permission?

Q. Grace is investigating a security incident where the attackers left USB drives containing infected files in the parking lot of an office building. What stage in the Cyber Kill Chain describes this action?

Q. Which one of the following is not an open-source intelligence gathering tool?

Q. Which one of the following tools is an exploitation framework commonly used by penetration testers?

Q. Which one of the following tools is not a password-cracking utility?

Q. Which one of the following vulnerability scanners is specifically designed to test the security of web applications against a wide variety of attacks?

Q. Which one of the following debugging tools does not support Windows systems?

Q. What is the final stage of the Cyber Kill Chain?

Q. Which one of the following activities assumes that an organization has already been compromised?

Q. Alan is creating a list of recommendations that his organization can follow to remediate issues identified during a penetration test. In what phase of the testing process is Alan participating?