When DNS is being used for load balancing, why would a penetration tester choose to identify a scan target by its IP address rather than its host name?
AAsingle IP may have multiple domains.
BA single domain name can only have one IP address.
CScanning tools only recognize IP addresses
DA single domain name may have multiple IP addresses.
0
Question 3
Offensive Operations Reconnaissance
0
Question 4
Penetration Testing of Domain Environments
0
Question 5
Enterprise System Penetration Testing
0
Question 6
Command and Control (C2) Communication and Evasion
Which of the following modes describes a wireless interface that is configured to passively grab wireless frames from one wireless channel and pass them to the operating system?
AMonitor Mode
BPromiscuous Mode
CManaged Mode
DMaster Mode
By default Active Directory Controllers store password representations in which file?
A%system roots .system 32/ntds.dit
B%System roots /ntds\ntds.dit
C%System roots /ntds\sam.dat
D%System roots /ntds\sam.dit
You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly change directories to where the Windows operating system resides, what command could you use?
Acd systemroot
Bcd-
Ccd /systemroot/
Dcd %systemroot%
Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?
AVncinject/find.lag
BVncinject/reverse.tcp
CVncinject/reverse-http
DVncinject /bind.tcp
Question 7
Command and Control (C2) Communication and Evasion
0
Question 8
Command and Control (C2) Communication and Evasion
Question 10
Offensive Operations Reconnaissance
Question 11
Network Access Exploitation
Question 12
Network Access Exploitation
Question 13
Network Scanning for Pen Tests
Question 14
Network Scanning for Pen Tests
Question 15
Network Scanning for Pen Tests
Question 16
Linux Penetration Testing Tools
Question 17
Password Analysis and Cracking
Question 18
Network Scanning for Pen Tests
Question 19
Network Access Exploitation
Question 20
Offensive Operations Reconnaissance
Question 21
Command and Control (C2) Communication and Evasion
Question 22
Command and Control (C2) Communication and Evasion
Question 23
Offensive Operations Reconnaissance
Question 24
Network Scanning for Pen Tests
Question 25
Network Access Exploitation
Question 26
Lateral Movement and Privilege Escalation
Question 27
Network Scanning for Pen Tests
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:
C:>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"
C:>sc vJnternet.host.com query ncservice.
What is the intent of the commands?
AThe first command creates a backdoor shell as a service. It is being started on TCP2222 using cmd.exe. The second command verifies the service is created and itsstatus.
BThe first command creates a backdoor shell as a service. It is being started on UDP2222 using cmd.exe. The second command verifies the service is created and itsstatus.
CThis creates a service called ncservice which is linked to the cmd.exe command andits designed to stop any instance of nc.exe being run. The second command verifiesthe service is created and its status.
DThe first command verifies the service is created and its status. The secondcommand creates a backdoor shell as a service. It is being started on TCP
A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?
AUse the http service's PUT command to push the file onto the target machine.
BUse the scp service, protocol SSHv2 to pull the file onto the target machine.
CUse the telnet service's ECHO option to pull the file onto the target machine
DUse the ftp service in passive mode to push the file onto the target machine.
Analyze the command output below. What information can the tester infer directly from the information shown?
AThe administrator account has no password
BNull sessions are enabled on the target
CThe target host is running Linux with Samba services
DAccount lockouts must be reset by the Administrator
Analyze the screenshot below. What type of vulnerability is being attacked?
AWindows Server service
BInternet Explorer
CWindows Powershell
DLocal Security Authority
Approximately how many packets are usually required to conduct a successful FMS attack onWEP?
A250.000
B20.000
C10.000,000
Dl (with a weak IV)
Based on the partial appdefstrig rile listed below, which port scan signature is classified by AMap as harmful?
Asmtp
Bnetbios-session
Chttp-trace
Dms-remote-desktop-protocol
During a penetration test we determine that TCP port 22 is listening on a target host. Knowing that SSHD is the typical service that listens on that port we attempt to validate that assumption with an SSH client but our effort Is unsuccessful. It turns out that it is actually an Apache webserver listening on the port, which type of scan would have helped us to determine what service was listening on port 22?
AVersion scanning
BPort scanning
CNetwork sweeping
DOS fingerprinting
During a penetration test you discover a valid set of SSH credentials to a remote system. How can this be used to your advantage in a Nessus scan?
AThis information can be entered under the 'Hydra' tab to launch a brute-forcepassword attack.
BThere isn't an advantage as Nessus will ultimately discover this information.
CThe "SSH' box can be checked to let Nessus know the remote system is running
DThis information can be entered under the 'credentials' tab to allow Nessus to log into the system
Given the following Scapy information, how is default Layer 2 information derived?
AThe default layer 2 information is contained in a local scapy.cfg configuration fileon the local system.
BIf not explicitly defined, the Ether type field value Is created using the hex value ofthe destination port, in this case 80
CIf not explicitly defined, pseudo-random values are generated for the Layer 2 defaultinformation.
DScapy relies on the underlying operating system to construct Layer 2 information touse as default.
How can a non-privileged user on a Unix system determine if shadow passwords are being used?
ARead /etc/password and look for "x" or "II" in the second colon-delimited field
BRead /etc/shadow and look for "x" or "II" in the second colon-delimited field
CVerify that /etc/password has been replaced with /etc/shadow
DRead /etc/shadow and look NULL values In the second comma delimited field
Which of the following TCP packet sequences are common during a SYN (or half-open) scan?
AA,B and C
BA and C
CC and D
DC and D
Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?
AOne-way, the client challenges the access point
BOne-way, the access point challenges the client
CNo challenges occur (or wireless connection
DTwo-way, both the client and the access point challenge each other
You have been contracted to map me network and try to compromise the servers for a client. Which of the following would be an example of scope creep' with respect to this penetration testing project?
ADisclosing information forbidden in the NDA
BCompromising a server then escalating privileges
CBeing asked to compromise workstations
DScanning network systems slowly so you are not detected
You have compromised a Windows workstation using Metasploit and have injected the Meterpreter payload into the svchost process. After modifying some files to set up a persistent backdoor you realize that you will need to change the modified and access times of the files to ensure that the administrator can't see the changes you made. Which Meterpreter module would you need to load in order to do this?
ACore
BPriv
CStdapi
DBrowser
Raw netcat shells and telnet terminals share which characteristic?
AAbility to send commands to a target machine.
BAbility to adapt output to the size of display window
CShells and terminals are exactly the same.
DAbility to process standard output control sequences.
You suspect that system administrators In one part of the target organization are turning off their systems during the times when penetration tests are scheduled, what feature could you add to the ' Rules of engagement' that could help your team test that part of the target organization?
AUn announced test
BTell response personnel the exact lime the test will occur
CTest systems after normal business hours
DLimit tests to business hours
You are using the Nmap Scripting Engine and want detailed output of the script as it runs. Which option do you include in the command string?
You successfully compromise a target system's web application using blind command injection. The command you injected is ping-n 1 192.168.1.200. Assuming your machine is 192.168.1 200, which of the following would you see?
APing-n 1 192.168.1 200 on the compromised system
BA 'Destination host unreachable' error message on the compromised system
CA packet containing 'Packets: Sent - 1 Received = 1, Loss = 0 (0% loss) on yoursniffer
DAn ICMP Echo packet on your sniffer containing the source address of the target
A penetration tester wishes to stop the Windows Firewall process on a remote host running Windows Vista She issues the following commands:
A check of the remote host indicates that Windows Firewall is still running. Why did the command fail?
AThe kernel prevented the command from being executed.
BThe user does not have the access level needed to stop the firewall.
CThe sc command needs to be passed the IP address of the target.
DThe remote server timed out and did not complete the command.
You are running a vulnerability scan on a remote network and the traffic Is not making It to the target system. You investigate the connection issue and determine that the traffic is making it to the internal interface of your network firewall, but not making. It to the external Interface or to any systems outside your firewall. What is the most likely problem?
AYour network firewall is blocking the traffic
BThe NAT or pat tables on your network based firewall are filling up and droppingthe traffic