AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: A hacker has successfully infiltrated a eccouncil video

Question 1
« Back   Next eccouncil Cloud ethical-hacker Question »

Full Certification Question

A hacker has successfully infiltrated a Linux host and exfiltrated the password file from /etc/passwd. Which of the following scenarios provides the most accurate description of what the attacker can potentially achieve with this file?