Question 8 the following command is run on a linux

This preview shows page 13 - 15 out of 15 pages.

Question: 8 The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now? A. Kernel vulnerabilities B. Sticky bits C. Unquoted service path D. Misconfigured sudo Answer: B
Visit us at
Question: 9 A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use?
Question: 10 During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikazt. Which of the following registry changes would allow for credential caching in memory?
Visit us at
Page | 1 For More Information - Visit: 20% Discount Coupon Code: 20off2018 Powered by TCPDF () Visit us at

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture