___ ___ ___ ___ ___ / _ \/ __| __| _ \ | __|_ ____ _ _ __ | (_) \__ \ _|| _/ | _|\ \ / _` | ' \ \___/|___/___|_| |___/_\_\__,_|_|_|_| ___ _ _ | _ \_ _ ___ _ __ __ _ _ _ __ _| |_(_)___ _ _ | _/ '_/ -_) '_ \/ _` | '_/ _` | _| / _ \ ' \ |_| |_| \___| .__/\__,_|_| \__,_|\__|_\___/_||_| |_|
The exam consists of one large network with multiple machines that must be compromised. As the exam network simulates a corporate network, you will have to first obtain a foothold and then perform additional internal attacks. There are multiple attack paths through the network that will result in the same level of compromise.