Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the
results of the vulnerability test.
The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive
from his vulnerability analysis?
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step
is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?
Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is
now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed
as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the
main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician
performed?
What will the following URL produce in an unpatched IIS Web Server?
http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to
find the file?
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?