Which of the following tools could be used to impersonate network resources and collect authentication requests?
During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network.
Which of the following tools could be used to impersonate network resources and collect authentication requests?
A . Ettercap
B . Tcpdump
C . Responder
D . Medusa
Answer: C
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments