Which of the following is the BEST technique to determine the known plaintext of the strings?

During an engagement, a penetration tester found the following list of strings inside a file: Which of the following is the BEST technique to determine the known plaintext of the strings?A . Dictionary attack B. Rainbow table attack C. Brute-force attack D. Credential-stuffing attackView AnswerAnswer: B

February 25, 2023 No Comments READ MORE +

Which of the following actions, if performed, would be ethical within the scope of the assessment?

A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position. Which of the following actions, if performed, would be ethical within...

February 24, 2023 No Comments READ MORE +

?

A consultant is reviewing the following output after reports of intermittent connectivity issues: ? (192.168.1.1) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet] ? (192.168.1.12) at 34:a4:be:09:44:f4 on en0 ifscope [ethernet] ? (192.168.1.17) at 92:60:29:12:ac:d2 on en0 ifscope [ethernet] ? (192.168.1.34) at 88:de:a9:12:ce:fb on en0 ifscope [ethernet] ? (192.168.1.136) at 0a:d1:fa:b1:01:67 on...

February 24, 2023 No Comments READ MORE +

Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?

Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?A . Whether the cloud service provider allows the penetration tester to test the environment B. Whether the specific cloud services are being used by the application C. The geographical location...

February 24, 2023 No Comments READ MORE +

You are a security analyst tasked with hardening a web server

HOTSPOT You are a security analyst tasked with hardening a web server. You have been given a list of HTTP payloads that were flagged as malicious. INSTRUCTIONS Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future. If...

February 24, 2023 No Comments READ MORE +

Which of the following steps should the tester take NEXT?

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps...

February 24, 2023 No Comments READ MORE +

Which of the following operating systems is MOST likely installed on the host?

During the reconnaissance phase, a penetration tester obtains the following output: Reply from 192.168.1.23: bytes=32 time<54ms TTL=128 Reply from 192.168.1.23: bytes=32 time<53ms TTL=128 Reply from 192.168.1.23: bytes=32 time<60ms TTL=128 Reply from 192.168.1.23: bytes=32 time<51ms TTL=128 Which of the following operating systems is MOST likely installed on the host?A . Linux...

February 24, 2023 No Comments READ MORE +

Which of the following vulnerabilities is the security consultant MOST likely to identify?

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?A . Weak authentication schemes B. Credentials...

February 23, 2023 No Comments READ MORE +

Which of the following would be the BEST to use to find vulnerabilities on this server?

A software company has hired a penetration tester to perform a penetration test on a database server. The tester has been given a variety of tools used by the company’s privacy policy. Which of the following would be the BEST to use to find vulnerabilities on this server?A . OpenVAS...

February 23, 2023 No Comments READ MORE +

When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the...

February 23, 2023 No Comments READ MORE +