Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames. Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?A . Sniff and then crack the WPS PIN...

June 28, 2023 No Comments READ MORE +

Which of the following is the reason for the error?

A penetration tester created the following script to use in an engagement: However, the tester is receiving the following error when trying to run the script: Which of the following is the reason for the error?A . The sys variable was not defined. B. The argv variable was not defined....

June 27, 2023 No Comments READ MORE +

Which of the following BEST describe the OWASP Top 10? (Choose two.)

Which of the following BEST describe the OWASP Top 10? (Choose two.)A . The most critical risks of web applications B. A list of all the risks of web applications C. The risks defined in order of importance D. A web-application security standard E. A risk-governance and compliance framework F....

June 27, 2023 No Comments READ MORE +

Which of the following is the BEST action for the penetration tester to take?

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier. Which of the following is the BEST action for the penetration tester to take?A . Utilize the...

June 27, 2023 No Comments READ MORE +

Which of the following provides a matrix of common tactics and techniques used by attackers along with recommended mitigations?

Which of the following provides a matrix of common tactics and techniques used by attackers along with recommended mitigations?A . NIST SP 800-53 B. OWASP Top 10 C. MITRE ATT&CK framework D. PTES technical guidelinesView AnswerAnswer: C Explanation: Reference: https://digitalguardian.com/blog/what-mitre-attck-framework

June 27, 2023 No Comments READ MORE +

Which of the following is the BEST passive method of obtaining the technical contacts for the website?

A penetration tester is conducting an engagement against an internet-facing web application and planning a phishing campaign. Which of the following is the BEST passive method of obtaining the technical contacts for the website?A . WHOIS domain lookup B. Job listing and recruitment ads C. SSL certificate information D. Public...

June 27, 2023 No Comments READ MORE +

Which of the following BEST characterizes the function performed by lines 5 and 6?

Given the following script: Which of the following BEST characterizes the function performed by lines 5 and 6?A . Retrieves the start-of-authority information for the zone on DNS server 10.10.10.10 B. Performs a single DNS query for www.comptia.org and prints the raw data output C. Loops through variable b to...

June 27, 2023 No Comments READ MORE +

Which of the following techniques would MOST likely be used to get legitimate access into the organization's building without raising too many alerts?

A penetration tester was hired to perform a physical security assessment of an organization's office. After monitoring the environment for a few hours, the penetration tester notices that some employees go to lunch in a restaurant nearby and leave their belongings unattended on the table while getting food. Which of...

June 27, 2023 No Comments READ MORE +

In which of the following places should the penetration tester look FIRST for the employees’ numbers?

A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees’ phone numbers on the company’s website, the tester has learned the complete phone catalog was published there a few months ago. In which of the following places should...

June 26, 2023 No Comments READ MORE +

Based on the information in the SOW, which of the following behaviors would be considered unethical?

A penetration tester is reviewing the following SOW prior to engaging with a client: “Network diagrams, logical and physical asset inventory, and employees’ names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client’s Chief Information Security Officer (CISO)...

June 26, 2023 No Comments READ MORE +