Question 156

A penetration tester ran the following Nmap scan on a computer:
nmap -aV 192.168.1.5
The organization said it had disabled Telnet from its environment. However, the results of the Nmap scan show port 22 as closed and port 23 as open to SSH. Which of the following is the BEST explanation for what happened?
  • Question 157

    Given the following Python script:

    Which of the following actions will it perform?
  • Question 158

    Instructions:
    Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
    You are a security analyst tasked with hardening a web server.
    You have been given a list of HTTP payloads that were flagged as malicious.

    Question 159

    A penetration tester observes that the content security policy header is missing during a web application penetration test. Which of the following techniques would the penetration tester MOST likely perform?
  • Question 160

    A penetration tester is designing a phishing campaign and wants to build list of users (or the target organization. Which of the following techniques would be the MOST appropriate?
    (Select TWO)