Which of the following settings in Shodan would meet the client’s requirements?

A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client’s requirements?A . “cisco-ios” “admin+1234” B. “cisco-ios” “no-password” C. “cisco-ios”...

February 28, 2023 No Comments READ MORE +

Which of the following was captured by the testing team?

A red team gained access to the internal network of a client during an engagement and used the Responder tool to capture important data. Which of the following was captured by the testing team?A . Multiple handshakes B. IP addresses C. Encrypted file transfers D. User hashes sent over SMBView...

February 28, 2023 No Comments READ MORE +

Which of the following situations would require a penetration tester to notify the emergency contact for the engagement?

Which of the following situations would require a penetration tester to notify the emergency contact for the engagement?A . The team exploits a critical server within the organization. B. The team exfiltrates PII or credit card data from the organization. C. The team loses access to the network remotely. D....

February 28, 2023 No Comments READ MORE +

Which of the following is the tester performing?

A penetration tester writes the following script: Which of the following is the tester performing?A . Searching for service vulnerabilities B. Trying to recover a lost bind shell C. Building a reverse shell listening on specified ports D. Scanning a network for specific open portsView AnswerAnswer: D Explanation: -z zero-I/O...

February 28, 2023 No Comments READ MORE +

Which of the following concerns would BEST support the software company’s request?

A company that developers embedded software for the automobile industry has hired a penetration-testing team to evaluate the security of its products prior to delivery. The penetration-testing team has stated its intent to subcontract to a reverse-engineering team capable of analyzing binaries to develop proof-of-concept exploits. The software company has...

February 28, 2023 No Comments READ MORE +

You are a security analyst tasked with hardening a web server

HOTSPOT You are a security analyst tasked with hardening a web server. You have been given a list of HTTP payloads that were flagged as malicious. INSTRUCTIONS Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future. If...

February 28, 2023 No Comments READ MORE +

Which of the following should be the NEXT step?

A final penetration test report has been submitted to the board for review and accepted. The report has three findings rated high. Which of the following should be the NEXT step?A . Perform a new penetration test. B. Remediate the findings. C. Provide the list of common vulnerabilities and exposures....

February 28, 2023 No Comments READ MORE +

Which of the following would the tester find MOST helpful in the initial information-gathering steps?

A company that requires minimal disruption to its daily activities needs a penetration tester to perform information gathering around the company’s web presence. Which of the following would the tester find MOST helpful in the initial information-gathering steps? (Choose two.)A . IP addresses and subdomains B. Zone transfers C. DNS...

February 27, 2023 No Comments READ MORE +

Which of the following OSs would MOST likely return a packet of this type?

A penetration tester ran a ping CA command during an unknown environment test, and it returned a 128 TTL packet. Which of the following OSs would MOST likely return a packet of this type?A . Windows B. Apple C. Linux D. AndroidView AnswerAnswer: A Explanation: Reference: https://www.freecodecamp.org/news/how-to-identify-basic-internet-problems-with-ping/

February 27, 2023 No Comments READ MORE +

Which of the following recommendations should the penetration tester include in the report?

A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very...

February 27, 2023 No Comments READ MORE +