Free CompTIA PenTest+ PT0-002 Practice Question

When leveraging the Empire framework in a post-exploitation phase, which action best facilitates lateral movement while minimizing the risk of detection?

  • Deploying Mimikatz on the compromised machine to extract plaintext passwords directly.

  • Executing a PowerShell remoting session to move to other machines using compromised credentials.

  • Brute-forcing network service accounts to gain access to additional systems.

  • Using Over-Pass-The-Hash (passing the ticket) to access resources with Kerberos authentication.

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot