10 20 11 20 13 20 9drag drop instructions analyze the

  • No School
  • AA 1
  • 2019freedumps
  • 20
  • 100% (4) 4 out of 4 people found this document helpful

This preview shows page 10 - 18 out of 20 pages.

10 / 20
11 / 20
Answer:12 / 20
13 / 20
9.DRAG DROPInstructions:Analyze the code segments to determine which sections are needed to complete aport scanning script. Drag the appropriate elements into the correct locations tocomplete the script. If at any time you would like to bring back the initial state of thesimulation, please click the resetall button. During a penetration test, you gain access to a system with a limited userinterface. This machine appears to have access to an isolated network that you wouldlike to port scan.Answer:14 / 20
10.A constant wants to scan all the TCP Pots on an identified device.Which of the following Nmap switches will complete this task?
11.A security consultant is trying to attack a device with a previously identified useraccount.15 / 20
Which of the following types of attacks is being executed?
12.The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudoWhich of the following issues may be exploited now?
13.A client is asking a penetration tester to evaluate a new web application foravailability.Which of the following types of attacks should the tester use?A. TCP SYN floodB. SQL injectionC. xssD. XMAS scanAnswer: B
14.During a penetration test, a tester runs a phishing campaign and receives a shellfrom an internal PC running Windows 10 OS. The tester wants to perform credentialharvesting with Mimikatz.Which of the following registry changes would allow for credential caching inmemory?16 / 20

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture