View Mode
Q: 1

[Attacks and Exploits] A penetration tester wants to use the following Bash script to identify active servers on a network:


1 network_addr="192.168.1" 2 for h in {1..254}; do 3 ping -c 1 -W 1 $network_addr.$h > /dev/null 4 if [ $? -eq 0 ]; then 5 echo "Host $h is up" 6 else 7 echo "Host $h is down" 8 fi 9 done

Which of the following should the tester do to modify the script?

Options
Q: 2
[Information Gathering and Vulnerability Scanning] A penetration tester is configuring a vulnerability management solution to perform credentialed scans of an Active Directory server. Which of the following account types should the tester provide to the scanner?
Options
Q: 3
[Attacks and Exploits] Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
Options
Q: 4
[Attacks and Exploits] During a security assessment, a penetration tester wants to compromise user accounts without triggering IDS/IPS detection rules. Which of the following is the most effective way for the tester to accomplish this task?
Options
Q: 5
[Reporting and Communication] Which of the following components should a penetration tester include in the final assessment report?
Options
Q: 6
[Attacks and Exploits] A penetration tester aims to exploit a vulnerability in a wireless network that lacks proper encryption. The lack of proper encryption allows malicious content to infiltrate the network. Which of the following techniques would most likely achieve the goal?
Options
Q: 7
[Information Gathering and Vulnerability Scanning] During an assessment, a penetration tester plans to gather metadata from various online files, including pictures. Which of the following standards outlines the formats for pictures, audio, and additional tags that facilitate this type of reconnaissance?
Options
Q: 8

[Information Gathering and Vulnerability Scanning] A penetration tester is enumerating a Linux system. The goal is to modify the following script to provide more comprehensive system information:

#!/bin/bash ps aux >> linux_enum.txt

Which of the following lines would provide the most comprehensive enumeration of the system?

Options
Q: 9
[Reporting and Communication] Which of the following elements of a penetration test report can be used to most effectively prioritize the remediation efforts for all the findings?
Options
Q: 10
[Information Gathering and Vulnerability Scanning] A penetration tester completed OSINT work and needs to identify all subdomains for mydomain.com. Which of the following is the best command for the tester to use?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE