1.
A penetration tester delivers a web application vulnerability scan report to a client. The penetration tester rates a vulnerability as medium severity. The same vulnerability was reported as a critical severity finding on the previous report. Which of the following is the MOST likely reason for the reduced severity?
2.
An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email in hopes the Chief Executive Officer (CEO) logs in to obtain the CEO's login credentials.
3.
A penetration tester is scanning a network for SSH and has a list of provided targets. Which of the following Nmap commands should the tester use?
4.
A penetration tester has compromised a host. Which of the following would be the correct syntax to create a Netcat listener on the device?
5.
A client asks a penetration tester to add more addresses to a test currently in progress. Which of the following would define the target list?
6.
Which of the following BEST explains why it is important to maintain confidentially of any identified findings when performing a penetration test?
7.
Given the following script: Which of the following BEST describes the purpose of this script?
8.
A consultant wants to scan all the TCP ports on an identified device. Which of the following Nmap switches will complete this task?
9.
A software development team recently migrated to new application software on the on-premises environment. Penetration test findings show that multiple vulnerabilities exist. If a penetration tester does not have access to a live or test environment, a test might be better to create the same environment on the VM. Which of the following is MOST important for confirmation?
10.
A tester has captured a NetNTLMv2 hash using Responder. Which of the following commands will allow the tester to crack the hash using a mask attack?