A penetration tester is performing a remote internal penetration test by connecting to the testing system from the Internet via a reverse SSH tunnel. The testing system has been placed on a general user subnet with an IP address of 192.168.1.13 and a gateway of 192.168.1.1. Immediately after running the command below, the penetration tester's SSH connection to the testing platform drops:Which of the following ettercap commands should the penetration tester use in the future to perform ARP spoofing while maintaining a reliable connection? A. # sudo ettercap ג€"Tq ג€"w output.cap ג€"M ARP /192.168.1.0/ /192.168.1.255/ B. # proxychains ettercap ג€"Tq ג€"w output.cap ג€"M ARP /192.168.1.13/ /192.168.1.1/ C. # ettercap ג€"Tq ג€"w output.cap ג€"M ARP 00:00:00:00:00:00//80 FF:FF:FF:FF:FF:FF//80 D. # ettercap ג€"ג€"safe-mode ג€"Tq ג€"w output.cap ג€"M ARP /192.168.1.2ג€"255/ /192.168.1.13/ E. # ettercap ג€"Tq ג€"w output.cap ג€"M ARP /192.168.1.2ג€"12;192.168.1.14ג€"255/ /192.168.1.1/  Suggested Answer: A Community Answer: E This question is in PT0-001 CompTIA PenTest+ Exam For getting CompTIA PenTest+ Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by CompTIA. Trademarks, certification & product names are used for reference only and belong to CompTIA. The website does not contain actual questions and answers from CompTIA's Certification Exams.
Please login or Register to submit your answer