Which of the following concerns would BEST support the software company’s request?

A company that developers embedded software for the automobile industry has hired a penetration-testing team to evaluate the security of its products prior to delivery. The penetration-testing team has stated its intent to subcontract to a reverse-engineering team capable of analyzing binaries to develop proof-of-concept exploits. The software company has...

November 29, 2023 No Comments READ MORE +

Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?

In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company’s servers. Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?A . Test for RFC-defined protocol conformance.B . Attempt...

November 29, 2023 No Comments READ MORE +

When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the...

November 28, 2023 No Comments READ MORE +

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the: A. SOW. B. SLA. C. ROE. D. NDAView AnswerAnswer: C Explanation: https://mainnerve.com/what-are-rules-of-engagement-in-pen-testing/#:~:text=The%20ROE%20includes%20the%20dates,limits%2C%20or%20out%20of %20scope.

November 28, 2023 No Comments READ MORE +

Which of the following should the penetration tester consider BEFORE running a scan?

A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades- old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any...

August 10, 2023 No Comments READ MORE +

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the: A. SOW. B. SLA. C. ROE. D. NDAView AnswerAnswer: C Explanation: https://mainnerve.com/what-are-rules-of-engagement-in-pen-testing/#:~:text=The%20ROE%20includes%20the%20dates,limits%2C%20or%20out%20of %20scope.

August 10, 2023 No Comments READ MORE +

<link rel=”stylesheet” href=”wp-admin/css/install.css?

A penetration tester is exploring a client’s website. The tester performs a curl command and obtains the following: * Connected to 10.2.11.144 (::1) port 80 (#0) > GET /readmine.html HTTP/1.1 > Host: 10.2.11.144 > User-Agent: curl/7.67.0 > Accept: */* >  * Mark bundle as not supporting multiuse < HTTP/1.1 200...

August 9, 2023 No Comments READ MORE +

In which of the following places should the penetration tester look FIRST for the employees’ numbers?

A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees’ phone numbers on the company’s website, the tester has learned the complete phone catalog was published there a few months ago. In which of the following places should...

August 9, 2023 No Comments READ MORE +

Which of the following BEST identifies this concept?

The delivery of a penetration test within an organization requires defining specific parameters regarding the nature and types of exercises that can be conducted and when they can be conducted. Which of the following BEST identifies this concept?A . Statement of work B. Program scope C. Non-disclosure agreement D. Rules...

August 9, 2023 No Comments READ MORE +

Which of the following is the BEST action for the penetration tester to take?

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier. Which of the following is the BEST action for the penetration tester to take?A . Utilize the...

August 9, 2023 No Comments READ MORE +