Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

During an assessment, a penetration tester wants to extend the vulnerability search to include the use of dynamic testing. Which of the following tools should the tester use?

A.

Mimikatz

B.

ZAP

C.

OllyDbg

D.

SonarQube

Which of the following is a reason to use a template when creating a penetration testing report?

A.

To articulate risks accurately

B.

To enhance the testing approach

C.

To contextualize collected data

D.

To standardize needed information

E.

To improve testing time

A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?

A.

curl < url > ?param=http://169.254.169.254/latest/meta-data/

B.

curl ' < url > ?param=http://127.0.0.1/etc/passwd '

C.

curl ' < url > ?param= < script > alert(1) < script > / '

D.

curl < url > ?param=http://127.0.0.1/

A penetration tester has discovered sensitive files on a system. Assuming exfiltration of the files is part of the scope of the test, which of the following is most likely to evade DLP systems?

A.

Encoding the data and pushing through DNS to the tester ' s controlled server.

B.

Padding the data and uploading the files through an external cloud storage service.

C.

Obfuscating the data and pushing through FTP to the tester ' s controlled server.

D.

Hashing the data and emailing the files to the tester ' s company inbox.

A tester performs a vulnerability scan and identifies several outdated libraries used within the customer SaaS product offering. Which of the following types of scans did the tester use to identify the libraries?

A.

IAST

B.

SBOM

C.

DAST

D.

SAST

Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?

A.

Remove the persistence mechanisms.

B.

Spin down the infrastructure.

C.

Preserve artifacts.

D.

Perform secure data destruction.

A tester compromises a target host and then wants to maintain persistent access. Which of the following is the best way for the attacker to accomplish the objective?

A.

Configure and register a service.

B.

Install and run remote desktop software.

C.

Set up a script to be run when users log in.

D.

Perform a kerberoasting attack on the host.

During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

A.

SQL injection

B.

SSRF

C.

XSS

D.

Server-side template injection

Which of the following best describes the importance of including the attack steps in a penetration test report?

A.

It easily provides the recommended mitigations.

B.

It ensures results can be independently verified.

C.

It proves the penetration tester’s competency to the customer.

D.

It demonstrates the difficulty of exploiting specific vulnerabilities in the kill chain.

A penetration tester has just started a new engagement. The tester is using a framework that breaks the life cycle into 14 components. Which of the following frameworks is the tester using?

A.

OWASP MASVS

B.

OSSTMM

C.

MITRE ATT & CK

D.

CREST