Which of the following would be best for performing

This preview shows page 14 - 17 out of 17 pages.

Question: 12 Which of the following would be BEST for performing passive reconnaissance on a target's external domain? A. Peach B. CeWL C. OpenVAS D. Shodan
Visit us at
Answer: D
Question: 13 If a security consultant comes across a password hash that resembles the following b117 525b3454 7Oc29ca3dBaeOb556ba8 Which of the following formats is the correct hash type?
Question: 14 A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack Which of the following remediation steps should be recommended? (Select THREE)
Question: 15 A software development team recently migrated to new application software on the on-premises environment Penetration test findings show that multiple vulnerabilities exist If a penetration tester does not have access to a live or test environment, a test might be better to create the same environment on the VM Which of the following is MOST important for confirmation?
Visit us at
Question: 16 A security analyst has uncovered a suspicious request in the logs for a web application. Given the following URL: http:Which of the following attack types is MOST likely to be the vulnerability? A. Directory traversal B. Cross-site scripting C. Remote file inclusion D. User enumeration Answer: B
Visit us at
Page | 1 For More Information - Visit: 20% Discount Coupon Code: 20off2019 Powered by TCPDF ()Visit us at

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture