Which of the following types of attacks is being executed?
12.The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudoWhich of the following issues may be exploited now?
13.A client is asking a penetration tester to evaluate a new web application foravailability.Which of the following types of attacks should the tester use?A. TCP SYN floodB. SQL injectionC. xssD. XMAS scanAnswer: B
14.During a penetration test, a tester runs a phishing campaign and receives a shellfrom an internal PC running Windows 10 OS. The tester wants to perform credentialharvesting with Mimikatz.Which of the following registry changes would allow for credential caching inmemory?16 / 20