Exam AQUESTION 1DRAG DROPPlace each of the following passwords in order of complexity from least complex (1) to most complex (4), based on the character sets represented. Each passwordmay be used only once.Select and Place:Correct Answer: VCEConvert.com
Section: (none)ExplanationExplanation/Reference:QUESTION 2DRAG DROPA manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = “Administrator”The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each stringmanipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:VCEConvert.com
Correct Answer: VCEConvert.com
Section: (none)ExplanationExplanation/Reference:QUESTION 3A penetration tester has compromised a Windows server and is attempting to achieve persistence. Which of the following would achieve that goal?A.schtasks.exe /create/tr “powershell.exe” Sv.ps1 /runB.net session server | dsquery -user | net use c$C.powershell && set-executionpolicy unrestrictedD.reg save HKLM\System\CurrentControlSet\Services\Sv.regCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 4A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing can begin?A.The physical location and network ESSIDs to be testedB.The number of wireless devices owned by the clientC.The client's preferred wireless access point vendorD.The bands and frequencies used by the client's devicesCorrect Answer: DSection: (none)ExplanationExplanation/Reference:QUESTION 5Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas facilities, dams,and nuclear facilities?A.ICS vendors are slow to implement adequate security controls.B.ICS staff are not adequately trained to perform basic duties.C.There is a scarcity of replacement equipment for critical devices.D.There is a lack of compliance for ICS facilities.VCEConvert.com
Correct Answer: BSection: (none)ExplanationExplanation/Reference:QUESTION 6A security analyst was provided with a detailed penetration report, which was performed against the organization's DMZ environment. It was noted on the report thata finding has a CVSS base score of 10.0. Which of the following levels of difficulty would be required to exploit this vulnerability?A.Very difficult; perimeter systems are usually behind a firewall.