88%(8)7 out of 8 people found this document helpful
This preview shows page 14 - 18 out of 28 pages.
The safer , easier way to help you pass any IT exams.6.A constant wants to scan all the TCP Pots on an identified device. Which of the following Nmap switches will complete this task? 14/ 26
The safer , easier way to help you pass any IT exams.Which of the following types of attacks is being executed? 15/ 268.The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now? 9.A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use? A. TCP SYN flood B. SQL injection C. xss D. XMAS scan Answer:B 10.During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikatz. Which of the following registry changes would allow for credential caching in memory?
16/ 2611.In which of the following components is an exploited vulnerability MOST likely to affect multiple running application containers at once? 12.Which of the following would be BEST for performing passive reconnaissance on a target's external domain? 13.If a security consultant comes across a password hash that resembles the following b117 525b3454 7Oc29ca3dBaeOb556ba8 Which of the following formats is the correct hash type? A. Kerberos B. NetNTLMvl C. NTLM D. SHA-1 Answer:D