لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees’ phone numbers on the company’s website, the tester has learned the complete phone catalog was published there a few months ago. In which of the following places should the penetration tester look FIRST for the employees’ numbers?
A. Web archive
B. GitHub
C. File metadata
D. Underground forums
عرض الإجابة
اجابة صحيحة: B
السؤال #2
The provision that defines the level of responsibility between the penetration tester and the client for preventing unauthorized disclosure is found in the:
A. NDA
B. SLA
C. MSA
D. SOW
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?
A. Check the scoping document to determine if exfiltration is within scope
B. Stop the penetration test
C. Escalate the issue
D. Include the discovery and interaction in the daily report
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?
A. chmod u+x script
B. chmod u+e script
C. chmod o+e script
D. chmod o+x script
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial data. Which of the following should the tester do with this information to make this a successful exploit?
A. Perform XSS
B. Conduct a watering-hole attack
C. Use BeEF
D. Use browser autopwn
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?
A. nmap192
B. nmap192
C. nmap192
D. nmap192
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A penetration tester was able to gain access successfully to a Windows workstation on a mobile client’s laptop. Which of the following can be used to ensure the tester is able to maintain access to the system?
A. schtasks /create /sc /ONSTART /tr C:\Temp\WindowsUpdate
B. wmic startup get caption,command
C. crontab –l; echo “@reboot sleep 200 && ncat –lvp 4242 –e /bin/bash”) | crontab 2>/dev/null
D. sudo useradd –ou 0 –g 0 user
عرض الإجابة
اجابة صحيحة: C
السؤال #8
During the scoping phase of an assessment, a client requested that any remote code exploits discovered during testing would be reported immediately so the vulnerability could be fixed as soon as possible. The penetration tester did not agree with this request, and after testing began, the tester discovered a vulnerability and gained internal access to the system. Additionally, this scenario led to a loss of confidential credit card data and a hole in the system. At the end of the test, the penetration teste
A. Deny that the vulnerability existed
B. Investigate the penetration tester
C. Accept that the client was right
D. Fire the penetration tester
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A company that developers embedded software for the automobile industry has hired a penetration-testing team to evaluate the security of its products prior to delivery. The penetration-testing team has stated its intent to subcontract to a reverse-engineering team capable of analyzing binaries to develop proof-of-concept exploits. The software company has requested additional background investigations on the reverse- engineering team prior to approval of the subcontract. Which of the following concerns woul
A. The reverse-engineering team may have a history of selling exploits to third parties
B. The reverse-engineering team may use closed-source or other non-public information feeds for its analysis
C. The reverse-engineering team may not instill safety protocols sufficient for the automobile industry
D. The reverse-engineering team will be given access to source code for analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #10
A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always- on VPN tunnel to a third-party supplier. Which of the following is the BEST action for the penetration tester to take?
A. Utilize the tunnel as a means of pivoting to other internal devices
B. Disregard the IP range, as it is out of scope
C. Stop the assessment and inform the emergency contact
D. Scan the IP range for additional systems to exploit
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A penetration tester opened a reverse shell on a Linux web server and successfully escalated privileges to root. During the engagement, the tester noticed that another user logged in frequently as root to perform work tasks. To avoid disrupting this user’s work, which of the following is the BEST option for the penetration tester to maintain root-level persistence on this server during the test?
A. Add a web shell to the root of the website
B. Upgrade the reverse shell to a true TTY terminal
C. Add a new user with ID 0 to the /etc/passwd file
D. Change the password of the root user and revert after the test
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A red team completed an engagement and provided the following example in the report to describe how the team gained access to a web server: x’ OR role LIKE '%admin% Which of the following should be recommended to remediate this vulnerability?
A. Multifactor authentication
B. Encrypted communications
C. Secure software development life cycle
D. Parameterized queries
عرض الإجابة
اجابة صحيحة: B
السؤال #13
A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report?
A. Add a dependency checker into the tool chain
B. Perform routine static and dynamic analysis of committed code
C. Validate API security settings before deployment
D. Perform fuzz testing of compiled binaries
عرض الإجابة
اجابة صحيحة: A
السؤال #14
During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?
A. Vulnerability scanning
B. Network segmentation
C. System hardening
D. Intrusion detection
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: