Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONBelajar1

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Belajar1

Description:
Usaha testing

Author:
AVATAR

Creation Date:
15/02/2024

Category:
Others

Number of questions: 12
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
A penetration tester is conducting an assessment against a group of publicly available web servers and notices a number of TCP resets returning from one of the web servers. Which of the following is MOST likely causing the TCP resets to occur during the assessment?!@# The web server is using a WAF. The web server is behind a load balancer. The web server is redirecting the requests. The local antivirus on the web server Is rejecting the connection.
A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees’ phone numbers on the company’s website, the tester has learned the complete phone catalog was published there a few months ago. In which of the following places should the penetration tester look FIRST for the employees’ numbers?!@# Web archive GitHub File metadata Underground forums.
A new client hired a penetration-testing company for a month-long contract for various security assessments against the client’s new service. The client is expecting to make the new service publicly available shortly after the assessment is complete and is planning to fix any findings, except for critical issues, after the service is made public. The client wants a simple report structure and does not want to receive daily findings. Which of the following is most important for the penetration tester to define FIRST?!@# Establish the format required by the client. Establish the threshold of risk to escalate to the client immediately. Establish the method of potential false positives. Establish the preferred day of the week for reporting.
A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?!@# ROE SLA MSA NDA.
A penetration tester who is performing a physical assessment of a company’s security practices notices the company does not have any shredders inside the office building. Which of the following techniques would be BEST to use to gain confidential information?!@# Badge cloning Dumpster diving Tailgating Shoulder surfing.
Which of the following assessment methods is MOST likely to cause harm to an ICS environment? Active scanning Ping sweep Protocol reversing Packet analysis.
Which of the following BEST describe the OWASP Top 10?!@# (Choose two.) The most critical risks of web applications A list of all the risks of web applications The risks defined in order of importance A web-application security standard A risk-governance and compliance framework A checklist of Apache vulnerabilities.
A penetration tester is explaining the MITRE ATT&CK framework to a company’s chief legal counsel. Which of the following would the tester MOST likely describe as a benefit of the framework?!@# Understanding the tactics of a security intrusion can help disrupt them. Scripts that are part of the framework can be imported directly into SIEM tools. The methodology can be used to estimate the cost of an incident better. The framework is static and ensures the stability of a security program over time.
A penetration tester executes the following Nmap command and obtains the following output: nmap -v -p 25 -- soript smtp-enum-users remotehost nmap -v -- script=mysql-info.nse remotehost nmap --ocript=omb-brute.noe remotehoat nmap -p 3306 -- script "http*vuln*" remotehost.
Appending string values onto another string is called: compilation connection concatenation conjunction.
A penetration tester was brute forcing an internal web server and ran a command that produced the following output: However, when the penetration tester tried to browse the URL http://172.16.100.10:3000/profile, a blank page was displayed. Which of the following is the MOST likely reason for the lack of output? The HTTP port is not open on the firewall. The tester did not run sudo before the command. The web server is using HTTPS instead of HTTP. This URI returned a server error.
A penetration tester gives the following command to a systems administrator to execute on one of the target servers: rm -f /var/www/html/G679h32gYu.php Which of the following BEST explains why the penetration tester wants this command executed?!@# To trick the systems administrator into installing a rootkit To close down a reverse shell To remove a web shell after the penetration test To delete credentials the tester created.
Report abuse Consent Terms of use