CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

You are assigned to assess the security posture of a client's network. During the initial phase, you decide to monitor the network traffic to identify potential data leakage or unsecured protocols in use. What is the most appropriate method to begin capturing network traffic without being detected by the client's network intrusion detection system?

  • Use port mirroring by configuring the switch to send a copy of all network packets to the port where you're connected.

  • Perform Ethernet sniffing directly on the client's network, targeting the gateway for maximum traffic coverage without ARP spoofing.

  • Physically plug into an open network port in the client's premises and begin capturing all traffic with a network protocol analyzer.

  • Employ a passive network tap to mirror the data passing through without injecting traffic.

This question is for objective:
Information Gathering and Vulnerability Scanning
Your Score:
Information Gathering and Vulnerability Scanning
Tools and Code Analysis