Which of the following commands will give the LEAST chance of detection?

An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the LEAST chance of detection?A . nmap -"T3 192.168.0.1 B. nmap - "P0 192.168.0.1 C. nmap - T0 192.168.0.1 D. nmap - A 192.168.0.1View AnswerAnswer: C

January 22, 2023 No Comments READ MORE +

Based on the output, which of the following services are MOST likely to be exploited?

A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following results: Based on the output, which of the following services are MOST likely to be exploited? (Choose two.)A . Telnet B. HTTP C. SMTP D. DNS E. NTP F. SNMPView AnswerAnswer: B,D

January 22, 2023 No Comments READ MORE +

Which of the following should the security company have acquired BEFORE the start of the assessment?

A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the...

January 22, 2023 No Comments READ MORE +

Which of the following actions should the tester take?

A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company’s network, with the constrained objective of gaining access to sensitive personnel files. During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment. Which of the...

January 22, 2023 No Comments READ MORE +

MOST likely reason for the error?

A penetration tester is testing a new version of a mobile application in a sandbox environment. To intercept and decrypt the traffic between the application and the external API, the tester has created a private root CA and issued a certificate from it. Even though the tester installed the root...

January 22, 2023 No Comments READ MORE +

Which of the following would the tester find MOST helpful in the initial information-gathering steps?

A company that requires minimal disruption to its daily activities needs a penetration tester to perform information gathering around the company’s web presence. Which of the following would the tester find MOST helpful in the initial information-gathering steps? (Choose two.)A . IP addresses and subdomains B. Zone transfers C. DNS...

January 22, 2023 No Comments READ MORE +

Which of the following would be the BEST command to use for further progress into the targeted network?

A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server. To remain stealthy, the tester ran the following command from the attack machine: Which of the following would be the BEST command to use...

January 21, 2023 No Comments READ MORE +

Which of the following line numbers from the script MOST likely contributed to the script triggering a “probable port scan” alert in the organization’s IDS?

The following line-numbered Python code snippet is being used in reconnaissance: Which of the following line numbers from the script MOST likely contributed to the script triggering a “probable port scan” alert in the organization’s IDS?A . Line 01 B. Line 02 C. Line 07 D. Line 08View AnswerAnswer: D

January 21, 2023 No Comments READ MORE +

You are a security analyst tasked with hardening a web server

HOTSPOT You are a security analyst tasked with hardening a web server. You have been given a list of HTTP payloads that were flagged as malicious. INSTRUCTIONS Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future. If...

January 21, 2023 No Comments READ MORE +

Which of the following would be BEST to add to the recommendations section of the final report?

A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key findings are as follows: • The following request was intercepted going to the network device: GET /login HTTP/1.1 Host: 10.50.100.16 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Accept-Language:...

January 21, 2023 No Comments READ MORE +