Which of the following remediation steps should be recommended?

A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack. Which of the following remediation steps should be recommended? (Select THREE)A ....

March 30, 2022 No Comments READ MORE +

Which of the following CVSS vulnerability scores would automatically bring the client out of compliance standards such as PCI 3.x?

A client needs to be PCI compliant and has external-facing web servers . Which of the following CVSS vulnerability scores would automatically bring the client out of compliance standards such as PCI 3.x?A . 2.9B . 3.0C . 4.0D . 5.9View AnswerAnswer: C Explanation: Reference: https://qualysguard.qg2.apps.qualys.com/qwebhelp/fo_portal/knowledgebase/pci_exceptions.htm

March 29, 2022 No Comments READ MORE +

Which of the following is indicative of an error-based SQL injection attack?

A penetration tester has been hired to perform a penetration test for an organization . Which of the following is indicative of an error-based SQL injection attack?A . a=1 or 1CCB . 1=1 or bCCC . 1=1 or 2CCD . 1=1 or aCCView AnswerAnswer: A

March 29, 2022 No Comments READ MORE +

Which of the following would be BEST to recommend?

A penetration tester observes that several high numbered ports are listening on a public web server. However, the system owner says the application only uses port 443 . Which of the following would be BEST to recommend?A . Transition the application to another portB . Filter port 443 to specific...

March 29, 2022 No Comments READ MORE +

Which of the following would be the BEST step for the penetration tester to take?

A penetration tester is required to perform OSINT on staff at a target company after completing the infrastructure aspect . Which of the following would be the BEST step for the penetration tester to take?A . Obtain staff information by calling the company and using social engineering techniques.B . Visit...

March 29, 2022 No Comments READ MORE +

Based on the response, which of the following vulnerabilities exists?

A penetration tester is assessing the security of a web form for a client and enters “;id” in one of the fields. The penetration tester observes the following response: Based on the response, which of the following vulnerabilities exists?A . SQL injectionB . Session hijackingC . Command injectionD . XSS/XSRFView...

March 29, 2022 No Comments READ MORE +

Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings?

A vulnerability scan identifies that an SSL certificate does not match the hostname; however, the client disputes the finding . Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings?A . Ensure the scanner can make outbound DNS requests.B . Ensure the scanner...

March 29, 2022 No Comments READ MORE +

Which of the following is a local host vulnerability that the attacker is exploiting?

A penetration tester executes the following commands: C:>%userprofile%jtr.exe This program has been blocked by group policy C:> accesschk.exe -w -s -q -u Users C:Windows rw C:WindowsTracing C:>copy %userprofile%jtr.exe C:WindowsTracing C:WindowsTracingjtr.exe jtr version 3.2… jtr> Which of the following is a local host vulnerability that the attacker is exploiting?A . Insecure...

March 29, 2022 No Comments READ MORE +

Which of the following should the tester request during the scoping phase?

A penetration tester must assess a web service . Which of the following should the tester request during the scoping phase?A . XSDB . After-hours contact escalationC . WSDLfileD . SOAP project fileView AnswerAnswer: C

March 29, 2022 No Comments READ MORE +

Which of the following attacks is MOST likely to succeed in creating a physical effect?

A penetration tester has obtained access to an IP network subnet that contains ICS equipment intercommunication . Which of the following attacks is MOST likely to succeed in creating a physical effect?A . DNS cache poisoningB . Record and replayC . Supervisory server SMBD . Blind SQL injectionView AnswerAnswer: C

March 28, 2022 No Comments READ MORE +