Which of the following situations would MOST likely warrant revalidation of a previous security assessment?
Which of the following situations would MOST likely warrant revalidation of a previous security assessment?A . After detection of a breach B. After a merger or an acquisition C. When an organization updates its network firewall configurations D. When most of the vulnerabilities have been remediatedView AnswerAnswer: D
Which of the following BEST describes what happened?
A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client’s IP address. The tester later discovered the SOC had used sinkholing on the penetration tester’s IP address. Which of the following BEST describes what happened?A . The penetration tester was testing...
Which of the following scans will the assessor MOST likely run?
An assessor wants to use Nmap to help map out a stateful firewall rule set. Which of the following scans will the assessor MOST likely run?A . nmap 192.168.0.1/24 B. nmap 192.168.0.1/24 C. nmap oG 192.168.0.1/24 D. nmap 192.168.0.1/24View AnswerAnswer: A
Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?
A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?A . PLCs...
Which of the following activities have a MINIMAL chance of detection?
A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)A . Open-source research B. A ping sweep C. Traffic sniffing D. Port knocking E. A vulnerability scan F. An Nmap scanView AnswerAnswer: A,C Explanation: Reference: https://www.sciencedirect.com/topics/computer-science/passive-reconnaissance
Which of the following commands will give the LEAST chance of detection?
An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the LEAST chance of detection?A . nmap -"T3 192.168.0.1 B. nmap - "P0 192.168.0.1 C. nmap - T0 192.168.0.1 D. nmap - A 192.168.0.1View AnswerAnswer: C
Based on the output, which of the following services are MOST likely to be exploited?
A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following results: Based on the output, which of the following services are MOST likely to be exploited? (Choose two.)A . Telnet B. HTTP C. SMTP D. DNS E. NTP F. SNMPView AnswerAnswer: B,D
Which of the following should the security company have acquired BEFORE the start of the assessment?
A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the...
Which of the following actions should the tester take?
A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company’s network, with the constrained objective of gaining access to sensitive personnel files. During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment. Which of the...
MOST likely reason for the error?
A penetration tester is testing a new version of a mobile application in a sandbox environment. To intercept and decrypt the traffic between the application and the external API, the tester has created a private root CA and issued a certificate from it. Even though the tester installed the root...