A) Peach
B) CeWL
C) OpenVAS
D) Shodan
Correct Answer
verified
Multiple Choice
A) Run the application through a dynamic code analyzer.
B) Employ a fuzzing utility.
C) Decompile the application.
D) Check memory allocations.
Correct Answer
verified
Multiple Choice
A) Whitelisting prevents a possible inadvertent DoS attack against the IPS and supporting log-monitoring systems.
B) Penetration testing of third-party IPS systems often requires additional documentation and authorizations; potentially delaying the time-sensitive test.
C) IPS whitelisting rules require frequent updates to stay current, constantly developing vulnerabilities and newly discovered weaknesses.
D) Testing should focus on the discovery of possible security issues across all in-scope systems, not on determining the relative effectiveness of active defenses such as an IPS.
Correct Answer
verified
Multiple Choice
A) The network is subnetted as a/25 or greater, and the tester needed to access hosts on two different subnets.
B) The tester is trying to perform a more stealthy scan by including several bogus addresses.
C) The scanning machine has several interfaces to balance the scan request across at the specified rate.
D) A discovery scan is run on the first set of addresses, whereas a deeper, more aggressive scan is run against the latter host.
Correct Answer
verified
Multiple Choice
A) nmap -p 22 -iL targets
B) nmap -p 22 -sL targets
C) nmap -p 22 -oG targets
D) nmap -p 22 -oA targets
Correct Answer
verified
Multiple Choice
A) DNS cache poisoning
B) Record and replay
C) Supervisory server SMB
D) Blind SQL injection
Correct Answer
verified
Multiple Choice
A) Rules of engagement
B) Mater services agreement
C) Statement of work
D) End-user license agreement
Correct Answer
verified
Multiple Choice
A) fpipe.exe -1 8080 -r 80 100.170.60.5
B) ike-scan -A -t 1 --sourceip=apoof_ip 100.170.60.5
C) nmap -sS -A -f 100.170.60.5
D) nc 100.170.60.5 8080 /bin/sh
Correct Answer
verified
Multiple Choice
A) Insecure file permissions
B) Application whitelisting
C) Shell escape
D) Writable service
Correct Answer
verified
Multiple Choice
A) Strong password policy
B) Password encryption
C) Email system hardening
D) Two-factor authentication
Correct Answer
verified
Multiple Choice
A) Run a network vulnerability scan.
B) Run a stress test.
C) Run an MITM attack.
D) Run a port scan.
Correct Answer
verified
Multiple Choice
A) Dynamic analysis
B) Fuzzing analysis
C) Static analysis
D) Run-time analysis
Correct Answer
verified
Multiple Choice
A) 1
B) 3
C) 5
D) 6
Correct Answer
verified
Multiple Choice
A) Manufacturers developing IoT devices are less concerned with security.
B) It is difficult for administrators to implement the same security standards across the board.
C) IoT systems often lack the hardware power required by more secure solutions.
D) Regulatory authorities often have lower security requirements for IoT systems.
Correct Answer
verified
Multiple Choice
A) Removing shells
B) Obtaining client acceptance
C) Removing tester-created credentials
D) Documenting lessons learned
E) Presenting attestation of findings
Correct Answer
verified
Multiple Choice
A) Shell binary placed in C:\windows\temp
B) Modified daemons
C) New user creation
D) Backdoored executables
Correct Answer
verified
Multiple Choice
A) Transition the application to another port.
B) Filter port 443 to specific IP addresses.
C) Implement a web application firewall.
D) Disable unneeded services.
Correct Answer
verified
Multiple Choice
A) HKEY_CLASSES_ROOT
B) HKEY_LOCAL_MACHINE
C) HKEY_CURRENT_USER
D) HKEY_CURRENT_CONFIG
Correct Answer
verified
Multiple Choice
A) The network is subnetted as a/25 or greater, and the tester needed to access hosts on two different subnets.
B) The tester is trying to perform a more stealthy scan by including several bogus addresses.
C) The scanning machine has several interfaces to balance the scan request across at the specified rate.
D) A discovery scan is run on the first set of addresses, whereas a deeper, more aggressive scan is run against the latter host.
Correct Answer
verified
Multiple Choice
A) Creating a scope of the critical production systems
B) Setting a schedule of testing access times
C) Establishing a white-box testing engagement
D) Having management sign off on intrusive testing
Correct Answer
verified
Showing 61 - 80 of 165
Related Exams