A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should the tester take NEXT?
Answer : C
A security engineer identified a new server on the network and wants to scan the host to determine if it is running an approved version of Linux and a patched version of Apache. Which of the following commands will accomplish this task?
Answer : C
Reference:
https://nmap.org/book/man-version-detection.html
Which of the following expressions in Python increase a variable val by one (Choose two.)
Answer : DF
Reference:
https://stackoverflow.com/questions/1485841/behaviour-of-increment-and-decrement-operators-in-python
Given the following output:
User-agent:*
Disallow: /author/
Disallow: /xmlrpc.php -
Disallow: /wp-admin -
Disallow: /page/
During which of the following activities was this output MOST likely obtained?
Answer : A
Appending string values onto another string is called:
Answer : C
Reference:
https://docs.microsoft.com/en-us/dotnet/csharp/how-to/concatenate-multiple-strings
A penetration tester is testing input validation on a search form that was discovered on a website. Which of the following characters is the BEST option to test the website for vulnerabilities?
Answer : C
A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the clientג€™s IP address. The tester later discovered the SOC had used sinkholing on the penetration testerג€™s IP address. Which of the following BEST describes what happened?
Answer : B
A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)
Answer : EF
Reference:
https://www.sciencedirect.com/topics/computer-science/passive-reconnaissance
A penetration tester obtained the following results after scanning a web server using the dirb utility:
...
GENERATED WORDS: 4612 -
---- Scanning URL: http://10.2.10.13/ ----
+ http://10.2.10.13/about (CODE:200|SIZE:1520)
+ http://10.2.10.13/home.html (CODE:200|SIZE:214)
+ http://10.2.10.13/index.html (CODE:200|SIZE:214)
+ http://10.2.10.13/info (CODE:200|SIZE:214)
...
DOWNLOADED: 4612 ג€" FOUND: 4 -
Which of the following elements is MOST likely to contain useful information for the penetration tester?
Answer : B
A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
Answer : C
A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service. Which of the following methods would BEST support validation of the possible findings?
Answer : D
Reference:
https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-security-secrets-amp-solutions-2nd-edition-9780071798778-0071798773-
9780071798761-0071798765.html
A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?
Answer : C
A software development team is concerned that a new product's 64-bit Windows binaries can be deconstructed to the underlying code. Which of the following tools can a penetration tester utilize to help the team gauge what an attacker might see in the binaries?
Answer : B
Reference:
https://en.wikipedia.org/wiki/OllyDbg
A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active. Which of the following commands should be used to accomplish the goal?
Answer : A
Reference:
https://hackerone.com/reports/193314
Which of the following tools provides Python classes for interacting with network protocols?
Answer : B
Reference:
https://github.com/SecureAuthCorp/impacket
Have any questions or issues ? Please dont hesitate to contact us