Given the following python script 1usrbinpython

This preview shows page 10 - 13 out of 46 pages.

Given the following Python script: #1/usr/bin/python import socket as skt for port in range (1,1024): try: sox=skt.socket(skt.AF.INET,skt.SOCK_STREAM) sox.settimeout(1000) sox.connect (('127.0.0.1', port)) print '%d:OPEN' % (port) sox.close except: continue Which of the following is where the output will go? A. To the screen B. To a network server C. To a file D. To /dev/null Answer: A IT Certification Guaranteed, The Easy Way!
10
NO.35 A penetration tester wants to check manually if a "ghost" vulnerability exists in a system. Which of the following methods is the correct way to validate the vulnerability? IT Certification Guaranteed, The Easy Way!
NO.36 While engaging clients for a penetration test from highly regulated industries, which of the following is usually the MOST important to the clients from a business perspective?
NO.37 An email sent from the Chief Executive Officer (CEO) to the Chief Financial Officer (CFO) states a wire transfer is needed to pay a new vendor. Neither is aware of the vendor, and the CEO denies ever sending the email. Which of the following types of motivation was used m this attack? 11
A. Principle of fear B. Principle of authority C. Principle of scarcity D. Principle of likeness E. Principle of social proof Answer: B
NO.38 In which of the following components is an exploited vulnerability MOST likely to affect multiple running application containers at once? A. Common libraries B. Configuration files C. Sandbox escape D. ASLR bypass Answer: A
NO.39 If a security consultant comes across a password hash that resembles the following b117 525b3454 7Oc29ca3dBaeOb556ba8 Which of the following formats is the correct hash type?
NO.40 A penetration testet is attempting to capture a handshake between a client and an access point by monitoring a WPA2-PSK secured wireless network The (ester is monitoring the correct channel tor the identified network but has been unsuccessful in capturing a handshake Given this scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture