Which of the following excerpts would come from a corporate policy?
D
A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following
command:
for m in {1..254..1};do ping -c 1 192.168.101.$m; done
Which of the following BEST describes the result of running this command?
C
A security consultant is trying to attack a device with a previously identified user account.
Which of the following types of attacks is being executed?
D
A client asks a penetration tester to add more addresses to a test currently in progress. Which of the following would define
the target list?
C
A penetration tester is required to perform OSINT on staff at a target company after completing the infrastructure aspect.
Which of the following would be the BEST step for penetration?
D
Explanation:
Reference: https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it
A company planned for and secured the budget to hire a consultant to perform a web application penetration test. Upon
discovering vulnerabilities, the company asked the consultant to perform the following tasks:
Code review
Updates to firewall settings
Which of the following has occurred in this situation?
A
A client has voiced concern about the number of companies being breached by remote attackers, who are looking for trade
secrets. Which of the following BEST describes the type of adversaries this would identify?
B
Explanation:
Reference: https://en.wikipedia.org/wiki/Advanced_persistent_threat
A penetration tester is performing a black box assessment on a web-based banking application. The tester was only
provided with a URL to the login page. Given the below code and output:
Which of the following is the tester intending to do?
D
Which of the following is the MOST comprehensive type of penetration test on a network?
A
Explanation:
Reference: https://purplesec.us/types-penetration-testing/
During post-exploitation, a tester identifies that only system binaries will pass an egress filter and store a file with the
following command:
c: \creditcards.db>c:\winit\system32\calc.exe:creditcards.db
Which of the following file system vulnerabilities does this command take advantage of?
B