Which of the following would be unique to a credentialed scan?

A penetration tester has run multiple vulnerability scans against a target system. Which of the following would be unique to a credentialed scan?A . Exploits for vulnerabilities foundB . Detailed service configurationsC . Unpatched third-party softwareD . Weak access control configurationsView AnswerAnswer: A

May 25, 2021 No Comments READ MORE +

Which of the following attack strategies should be prioritized from the scan results above?

A penetration tester identifies the following findings during an external vulnerability scan: Which of the following attack strategies should be prioritized from the scan results above?A . Obsolete software may contain exploitable componentsB . Weak password management practices may be employedC . Cryptographically weak protocols may be interceptedD . Web...

May 25, 2021 No Comments READ MORE +

Which of the following describes the scoping target information MOST likely needed before testing can begin?

A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing can begin?A . The physical location and network ESSIDs to be testedB . The number of wireless devices owned by the clientC . The client's preferred wireless access...

May 25, 2021 No Comments READ MORE +

Which of the following methods is the correct way to validate the vulnerability?

A penetration tester wants to check manually if a “ghost” vulnerability exists in a system. Which of the following methods is the correct way to validate the vulnerability?A . Download the GHOST file to a Linux system and compile gcc -o GHOST test i: ./GHOSTB . Download the GHOST file...

May 24, 2021 No Comments READ MORE +

Which of the following Nmap commands should the consultant run?

A consultant is identifying versions of Windows operating systems on a network. Which of the following Nmap commands should the consultant run?A . nmap -T4 -v -sU -iL /tmp/list.txt -Pn ―script smb-system-infoB . nmap -T4 -v -iL /tmp/list .txt -Pn ―script smb-os-disccveryC . nmap -T4 -v -6 -iL /tmp/liat.txt -Pn...

May 24, 2021 No Comments READ MORE +

perform ARP spoofing while maintaining a reliable connection?

A penetration tester is performing a remote internal penetration test by connecting to the testing system from the Internet via a reverse SSH tunnel. The testing system has been placed on a general user subnet with an IP address of 192.168.1.13 and a gateway of 192.168.1.1. Immediately after running the...

May 24, 2021 No Comments READ MORE +

Which of the following is the MOST comprehensive type of penetration test on a network?

Which of the following is the MOST comprehensive type of penetration test on a network?A . Black boxB . White boxC . Gray boxD . Red teamE . Architecture reviewView AnswerAnswer: A Explanation: Reference: https://purplesec.us/types-penetration-testing/

May 24, 2021 No Comments READ MORE +

Which of the following has MOST likely occurred?

A security guard observes an individual entering the building after scanning a badge. The facility has a strict badge-in and badge-out requirement with a turnstile. The security guard then audits the badge system and finds two log entries for the badge in question within the last 30 minutes. Which of...

May 24, 2021 No Comments READ MORE +

You are a penetration Inter reviewing a client's website through a web browser

DRAG DROP Performance based You are a penetration Inter reviewing a client's website through a web browser. Instructions: Review all components of the website through the browser to determine if vulnerabilities are present. Remediate ONLY the highest vulnerability from either the certificate source or cookies. View AnswerAnswer: Explanation: Step 1...

May 23, 2021 No Comments READ MORE +

Which of the following can be used to escape the limited shell and create a fully functioning TTY?

After successfully exploiting a local file inclusion vulnerability within a web application a limited reverse shell is spawned back to the penetration tester's workstation. Which of the following can be used to escape the limited shell and create a fully functioning TTY?A . per1 -e ' : set shall=/bin/bash:shell'B ....

May 23, 2021 No Comments READ MORE +