100%(9)9 out of 9 people found this document helpful
This preview shows page 20 - 26 out of 46 pages.
NO.59A penetration tester has successfully exploited an application vulnerability and wants toremove the command history from the Linux session. Which of the following will accomplish thissuccessfully?A.history --removeB.cat history I clearC.rm -f ./historyD.history -cAnswer:DNO.60A company planned for and secured the budget to hire a consultant to perform a webapplication penetration test. Upon discovered vulnerabilities, the company asked the consultant toperform the following tasks:* Code review* Updates to firewall settingNO.61A penetration tester observes that the content security policy header is missing during a webapplication penetration test. Which of the following techniques would the penetration tester MOSTlikely perform?ExplanationReferences: NO.62Performance basedYou are a penetration Inter reviewing a client's website through a web browser.Instructions:Review all components of the website through the browser to determine if vulnerabilities areIT Certification Guaranteed, The Easy Way!20
present.Remediate ONLY the highest vulnerability from either the certificate source or cookies.IT Certification Guaranteed, The Easy Way!21
IT Certification Guaranteed, The Easy Way!22
IT Certification Guaranteed, The Easy Way!23
Answer:ExplanationStep 1Generate a Certificate Signing RequestIT Certification Guaranteed, The Easy Way!24
Step 2Submit CSR to the CAStep 3Installed re-issued certificate on the serverStep 4Remove Certificate from ServerNO.63While prioritizing findings and recommendations for an executive summary, which of thefollowing considerations would De MOST valuable to the client?NO.64A penetration tester wants to launch a graphic console window from a remotelycompromised host with IP10.0.0.20 and display the terminal on the local computer with IP 192.168.1.10. Which of the followingwould accomplish this task?A.From the remote computer, run the following commands:Export IHOST 192.168.1.10:0.0xhost+TerminalB.From the local computer, run the following commandssh -L4444 : 127.0.01:6000 -% [email protected] xtermC.From the local computer, run the following commandssh -r6000 : 127.0.01:4444 -p 6000 [email protected] "xhost+; xterm"D.From the local computer, run the following commandNc -1 -p 6000Then, from the remote computer, run the following commandXterm | nc 192.168.1.10 6000Answer:A