Which of the following are needed to conduct this scan?

Correct Answer for the Question – Which of the following are needed to conduct this scan? is given below A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).Reference https://securitytrails.com/blog/top-15-nmap-commands-to-scan-remote-hosts#six-scan-hosts-and-ip-addresses-reading-from-a-text-file … Read more

Which of the following commands will test if the VPN is available?

Correct Answer for the Question – Which of the following commands will test if the VPN is available? is given below A company hires a penetration tester to determine if there are any vulnerabilities in its new VPN concentrator installation with an external IP of 100.170.60.6. Which of the following commands will test if the VPN … Read more

Which of the following is the MOST effective way to notify management of this finding and its importance?

Correct Answer for the Question – Which of the following is the MOST effective way to notify management of this finding and its importance? is given below A penetration test was performed by an on-staff junior technician. During the test, the technician discovered the web application could disclose an SQL table with user account and password … Read more

Which of the following is the BEST explanation for what happened?

Correct Answer for the Question – Which of the following is the BEST explanation for what happened? is given below A penetration tester ran the following Nmap scan on a computer: nmap -aV 192.168.1.5The organization said it had disabled Telnet from its environment. However, the results of the Nmap scan show port 22 as closed and … Read more

Which of the following is the MOST likely reason?

Correct Answer for the Question – Which of the following is the MOST likely reason? is given below A company performed an annual penetration test of its environment. In addition to several new findings, all of the previously identified findings persisted on the latest report. Which of the following is the MOST likely reason? Infrastructure is … Read more

Which of the following has a direct and significant impact on the budget of the security assessment?

Correct Answer for the Question – Which of the following has a direct and significant impact on the budget of the security assessment? is given below Which of the following has a direct and significant impact on the budget of the security assessment? Scoping Scheduling Compliance requirement Target risk Correct Answer The Correct Answer for this … Read more

Which of the following commands can the assessor use to find any likely Windows domain controllers?

Correct Answer for the Question – Which of the following commands can the assessor use to find any likely Windows domain controllers? is given below An assessor begins an internal security test of the Windows domain internal.comptia.net. The assessor is given network access via DHCP, but is not given any network maps or target IP addresses. … Read more

When performing compliance-based assessments, which of the following is the MOST important key consideration?

Correct Answer for the Question – When performing compliance-based assessments, which of the following is the MOST important key consideration? is given below When performing compliance-based assessments, which of the following is the MOST important key consideration? Additional rate Company policy Impact tolerance Industry type Correct Answer The Correct Answer for this Question is Company policy … Read more

Which of the following would a malicious actor do to exploit this configuration setting?

Correct Answer for the Question – Which of the following would a malicious actor do to exploit this configuration setting? is given below A penetration tester notices that the X-Frame-Options header on a web application is not set. Which of the following would a malicious actor do to exploit this configuration setting? Use path modification to … Read more

Which of the following BEST describes the result of running this command?

Correct Answer for the Question – Which of the following BEST describes the result of running this command? is given below A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following command: for m in {1..254..1};do ping -c 1 192.168.101.$m; doneWhich of the following BEST … Read more