A. IAM
B. Block storage
C. Virtual private cloud
D. Metadata services
A. Use steganography and send the file over FTP
B. Compress the file and send it using TFTP
C. Split the file in tiny pieces and send it over dnscat
D. Encrypt and send the file over HTTPS
A. Kiosk escape
B. Arbitrary code execution
C. Process hollowing
D. Library injection
A. Latches
B. Pins
C. Shackle
D. Plug
A. IAST
B. SBOM
C. DAST
D. SAST
A. Run scripts to terminate the implant on affected hosts.
B. Spin down the C2 listeners.
C. Restore the firewall settings of the original affected hosts.
D. Exit from C2 listener active sessions.
A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?
A. OS fingerprinting
B. Attack path mapping
C. Service discovery
D. User enumeration
A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?
A. route.exe print
B. netstat.exe -ntp
C. net.exe commands
D. strings.exe -a
A. curl <url>?param=http://169.254.169.254/latest/meta-data/
B. curl '<url>?param=http://127.0.0.1/etc/passwd'
C. curl '<url>?param=<script>alert(1)<script>/'
D. curl <url>?param=http://127.0.0.1/
A. Cryptographic flaws
B. Protocol scanning
C. Cached pages
D. Job boards
Page 1 out of 9 Pages |