Which of the following remediation steps should be recommended?
A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack. Which of the following remediation steps should be recommended? (Select THREE)A ....
Which of the following CVSS vulnerability scores would automatically bring the client out of compliance standards such as PCI 3.x?
A client needs to be PCI compliant and has external-facing web servers . Which of the following CVSS vulnerability scores would automatically bring the client out of compliance standards such as PCI 3.x?A . 2.9B . 3.0C . 4.0D . 5.9View AnswerAnswer: C Explanation: Reference: https://qualysguard.qg2.apps.qualys.com/qwebhelp/fo_portal/knowledgebase/pci_exceptions.htm
Which of the following is indicative of an error-based SQL injection attack?
A penetration tester has been hired to perform a penetration test for an organization . Which of the following is indicative of an error-based SQL injection attack?A . a=1 or 1CCB . 1=1 or bCCC . 1=1 or 2CCD . 1=1 or aCCView AnswerAnswer: A
Which of the following would be BEST to recommend?
A penetration tester observes that several high numbered ports are listening on a public web server. However, the system owner says the application only uses port 443 . Which of the following would be BEST to recommend?A . Transition the application to another portB . Filter port 443 to specific...
Which of the following would be the BEST step for the penetration tester to take?
A penetration tester is required to perform OSINT on staff at a target company after completing the infrastructure aspect . Which of the following would be the BEST step for the penetration tester to take?A . Obtain staff information by calling the company and using social engineering techniques.B . Visit...
Based on the response, which of the following vulnerabilities exists?
A penetration tester is assessing the security of a web form for a client and enters “;id” in one of the fields. The penetration tester observes the following response: Based on the response, which of the following vulnerabilities exists?A . SQL injectionB . Session hijackingC . Command injectionD . XSS/XSRFView...
Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings?
A vulnerability scan identifies that an SSL certificate does not match the hostname; however, the client disputes the finding . Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings?A . Ensure the scanner can make outbound DNS requests.B . Ensure the scanner...
Which of the following is a local host vulnerability that the attacker is exploiting?
A penetration tester executes the following commands: C:>%userprofile%jtr.exe This program has been blocked by group policy C:> accesschk.exe -w -s -q -u Users C:Windows rw C:WindowsTracing C:>copy %userprofile%jtr.exe C:WindowsTracing C:WindowsTracingjtr.exe jtr version 3.2… jtr> Which of the following is a local host vulnerability that the attacker is exploiting?A . Insecure...
Which of the following should the tester request during the scoping phase?
A penetration tester must assess a web service . Which of the following should the tester request during the scoping phase?A . XSDB . After-hours contact escalationC . WSDLfileD . SOAP project fileView AnswerAnswer: C
Which of the following attacks is MOST likely to succeed in creating a physical effect?
A penetration tester has obtained access to an IP network subnet that contains ICS equipment intercommunication . Which of the following attacks is MOST likely to succeed in creating a physical effect?A . DNS cache poisoningB . Record and replayC . Supervisory server SMBD . Blind SQL injectionView AnswerAnswer: C