During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the: A. SOW. B. SLA. C. ROE. D. NDAView AnswerAnswer: C Explanation: https://mainnerve.com/what-are-rules-of-engagement-in-pen-testing/#:~:text=The%20ROE%20includes%20the%20dates,limits%2C%20or%20out%20of %20scope.

March 15, 2025 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT SIMULATION Using the output, identify potential attack vectors that should be further investigated. View AnswerAnswer: 1: Null session enumeration Weak SMB file permissions Fragmentation attack 2: nmap -sV -p 1-1023

March 15, 2025 No Comments READ MORE +

Which of the following would a company's hunt team be MOST interested in seeing in a final report?

Which of the following would a company's hunt team be MOST interested in seeing in a final report?A . Executive summaryB . Attack TTPsC . MethodologyD . Scope detailsView AnswerAnswer: B

March 14, 2025 No Comments READ MORE +

Which of the following operating systems is MOST likely installed on the host?

During the reconnaissance phase, a penetration tester obtains the following output: Reply from 192.168.1.23: bytes=32 time<54ms TTL=128 Reply from 192.168.1.23: bytes=32 time<53ms TTL=128 Reply from 192.168.1.23: bytes=32 time<60ms TTL=128 Reply from 192.168.1.23: bytes=32 time<51ms TTL=128 Which of the following operating systems is MOST likely installed on the host?A . LinuxB...

March 13, 2025 No Comments READ MORE +

Which of the following command sequences should the penetration tester try NEXT?

A penetration tester runs a scan against a server and obtains the following output: 21/tcp open ftp Microsoft ftpd | ftp-anon: Anonymous FTP login allowed (FTP code 230) | 03-12-20 09:23AM 331 index.aspx | ftp-syst: 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds...

March 12, 2025 No Comments READ MORE +

Based on these results, which of the following attacks is MOST likely to succeed?

The following output is from reconnaissance on a public-facing banking website: Based on these results, which of the following attacks is MOST likely to succeed?A . A birthday attack on 64-bit ciphers (Sweet32)B . An attack that breaks RC4 encryptionC . An attack on a session ticket extension (Ticketbleed)D ....

March 12, 2025 No Comments READ MORE +

Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?

A penetration tester ran a simple Python-based scanner. The following is a snippet of the code: Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?A . sock.settimeout(20) on line 7 caused each next socket to be created every 20 milliseconds.B...

March 11, 2025 No Comments READ MORE +

Which of the following tools or techniques would BEST support additional reconnaissance?

A penetration tester has been hired to perform a physical penetration test to gain access to a secure room within a client’s building. Exterior reconnaissance identifies two entrances, a WiFi guest network, and multiple security cameras connected to the Internet. Which of the following tools or techniques would BEST support...

March 10, 2025 No Comments READ MORE +

Which of the following would BEST explain the reason why this policy is in place?

A company requires that all hypervisors have the latest available patches installed. Which of the following would BEST explain the reason why this policy is in place?A . To provide protection against host OS vulnerabilitiesB . To reduce the probability of a VM escape attackC . To fix any misconfigurations...

March 7, 2025 No Comments READ MORE +

Which of the following documents is agreed upon by all parties associated with the penetration-testing engagement and defines the scope, contacts, costs, duration, and deliverables?

Which of the following documents is agreed upon by all parties associated with the penetration-testing engagement and defines the scope, contacts, costs, duration, and deliverables?A . SOWB . SLAC . MSAD . NDAView AnswerAnswer: A

March 6, 2025 No Comments READ MORE +