You have been contracted to map me network and try to compromise the servers for a client. Which of the following would be an example of scope creep' with respect to this penetration testing project?
Answer : B
Which of the following modes describes a wireless interface that is configured to passively grab wireless frames from one wireless channel and pass them to the operating system?
Answer : C
Reference:
http://www.willhackforsushi.com/books/377_eth_2e_06.pdf
Your company has decided that the risk of performing a penetration test Is too great. You would like to figure out other ways to find vulnerabilities on their systems, which of the following is MOST likely to be a valid alternative?
Answer : A
A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester attempting to accomplish using the following Nmap command?
Answer : D
All of the following are advantages of using the Metasploitpriv module for dumping hashes from a local Windows machine EXCEPT:
Answer : B
Reference:
http://www.vita.virginia.gov/uploadedFiles/VITA_Main_Public/Security/Meetings/ISOAG/20
12/2012_Jan_ISOAG.pdf
During a penetration test we determine that TCP port 22 is listening on a target host.
Knowing that SSHD is the typical service that listens on that port we attempt to validate that assumption with an SSH client but our effort Is unsuccessful. It turns out that it is actually an Apache webserver listening on the port, which type of scan would have helped us to determine what service was listening on port 22?
Answer : C
A junior penetration tester at your firm is using a non-transparent proxy for the first time to test a web server. He sees the web site In his browser but nothing shows up In the proxy.
He tells you that he just installed the non-transparent proxy on his computer and didn't change any defaults. After verifying the proxy is running, you ask him to open up his browser configuration, as shown in the figure, which of the following recommendations will correctly allow him to use the transparent proxy with his browser?
Answer : C
You have been contracted to perform a black box pen test against the Internet facing servers for a company. They want to know, with a high level of confidence, if their servers are vulnerable to external attacks. Your contract states that you can use all tools available to you to pen test the systems. What course of action would you use to generate a report with the lowest false positive rate?
Answer : B
Analyze the command output below. Given this information, which is the appropriate next step for the tester?
Starting Nmap4.53 (hnp://insecure.org I at2010-09-30 19:13 EDT interesting ports on
192.163.116.101:
PORT STATE SERVICE -
130/tcp filtered cisco-fna
131/tcp filtered cisco-tna
132/tcp filtered cisco-sys
133/tcp filtered statsrv
134/tcp filtered Ingres-net
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp open netbios-ssn
140/tcp filtered emfis-data
MAC Address: 00:30:1&:B8:14:8B (Shuttle)
warning: OSS can results may be unreliable because we could not find at least l open and l closed port
Device type, general purpose -
Running: Microsoft Windows XP -
OS details: Microsoft Windows XP SP2
Network Distance : 1 hop -
Nmap done: I IP address (I host up) scanned in l .263 seconds
Answer : B
What problem occurs when executing the following command from within a netcat raw shell? sudo cat /etc/shadow
Answer : A
Which of the following file transfer programs will automatically convert end-of line characters between different platforms when placed in ASCII Mode?
Answer : A
Reference:
https://wiki.filezilla-project.org/Data_Type
What is the most likely cause of the responses on lines 10 and 11 of the output below?
Answer : D
Which of the following is the feature that separates the use of Rainbow Tables from other applications such as Cain or John the Ripper?
Answer : B
You have compromised a Windows workstation using Metasploit and have injected the
Meterpreter payload into the smss process. You want to dump the SAM database of the remote system so you can crack it offline. Which Meterpreter module would you need to load in addition to the defaults so that you can accomplish this?
Answer : C
Analyze the command output below. What information can the tester infer directly from the information shown?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us