Which of the following are needed to conduct this scan?

Correct Answer for the Question – Which of the following are needed to conduct this scan? is given below A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).Reference https://securitytrails.com/blog/top-15-nmap-commands-to-scan-remote-hosts#six-scan-hosts-and-ip-addresses-reading-from-a-text-file … Read more

Which of the following is MOST important for confirmation?

Correct Answer for the Question – Which of the following is MOST important for confirmation? is given below A software development team recently migrated to new application software on the on-premises environment. Penetration test findings show that multiple vulnerabilities exist. If a penetration tester does not have access to a live or test environment, a test … Read more

Which of the following BEST describes the type of adversaries this would identify?

Correct Answer for the Question – Which of the following BEST describes the type of adversaries this would identify? is given below A client has voiced concern about the number of companies being breached by remote attackers, who are looking for trade secrets. Which of the following BEST describes the type of adversaries this would identify?Reference: … Read more

Which of the following commands will allow the tester to crack the hash using a mask attack?

Correct Answer for the Question – Which of the following commands will allow the tester to crack the hash using a mask attack? is given below A tester has captured a NetNTLMv2 hash using Responder. Which of the following commands will allow the tester to crack the hash using a mask attack? hashcat -m 5600 -r … Read more

Which of the following Nmap commands should the tester use?

Correct Answer for the Question – Which of the following Nmap commands should the tester use? is given below A penetration tester is scanning a network for SSH and has a list of provided targets. Which of the following Nmap commands should the tester use? nmap -p 22 -iL targets nmap -p 22 -sL targets nmap … Read more

Which of the following BEST describes the technique that was used to obtain this information?

Correct Answer for the Question – Which of the following BEST describes the technique that was used to obtain this information? is given below At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted … Read more

Which of the following items is required?

Correct Answer for the Question – Which of the following items is required? is given below A penetration tester has been asked to conduct a penetration test on a REST-based web service. Which of the following items is required? The latest vulnerability scan results A list of sample application requests An up-to-date list of possible exploits … Read more

Which of the following would be the BEST step for penetration?

Correct Answer for the Question – Which of the following would be the BEST step for penetration? is given below A penetration tester is required to perform OSINT on staff at a target company after completing the infrastructure aspect. Which of the following would be the BEST step for penetration?Reference: https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it Obtain staff information by calling … Read more

Which of the following tools could be used to impersonate network resources and collect authentication requests?

Correct Answer for the Question – Which of the following tools could be used to impersonate network resources and collect authentication requests? is given below During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network. Which of the following tools could be used to impersonate network resources and collect … Read more

Which of the following Nmap switches will complete this task?

Correct Answer for the Question – Which of the following Nmap switches will complete this task? is given below A consultant wants to scan all the TCP ports on an identified device. Which of the following Nmap switches will complete this task?Reference: https://securitytrails.com/blog/top-15-nmap-commands-to-scan-remote-hosts #NAME? -p ALL -p 1-65534 -port 1-65534 Correct Answer The Correct Answer for … Read more