Question 201

After performing a security assessment for a firm, the client was found to have been billed for the time the client's test environment was unavailable The Client claims to have been billed unfairly. Which of the following documents would MOST likely be able to provide guidance in such a situation?
  • Question 202

    After successfully exploiting a local file inclusion vulnerability within a web application a limited reverse shell is spawned back to the penetration tester's workstation Which of the following can be used to escape the limited shell and create a fully functioning TTY?
  • Question 203

    A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)
  • Question 204

    In a physical penetration testing scenario, the penetration tester obtains physical access to a laptop following .s a potential NEXT step to extract credentials from the device?
  • Question 205

    Given the following Python script:
    #1/usr/bin/python
    import socket as skt
    for port in range (1,1024):
    try:
    sox=skt.socket(skt.AF.INET,skt.SOCK_STREAM)
    sox.settimeout(1000)
    sox.connect (('127.0.0.1', port))
    print '%d:OPEN' % (port)
    sox.close
    except: continue
    Which of the following is where the output will go?