Question 51

Joe, an attacker, intends to transfer funds discreetly from a victim's account to his own. Which of the following URLs can he use to accomplish this attack?
  • Question 52

    A manager calls upon a tester to assist with diagnosing an issue within the following Python script:
    #!/usr/bin/python
    s = "Administrator"
    The tester suspects it is an issue with string slicing and manipulation Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment Options may be used once or not at all

    Question 53

    During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network. Which of the following tools could be used to impersonate network resources and collect authentication requests?
  • Question 54

    A manager calls upon a tester to assist with diagnosing an issue within the following Python script:
    #!/usr/bin/python
    s = "Administrator"
    The tester suspects it is an issue with string slicing and manipulation Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment Options may be used once or not at all

    Question 55

    A penetration tester is able to move laterally throughout a domain with minimal roadblocks after compromising a single workstation. Which of the following mitigation strategies would be BEST to recommend in the report?
    (Select THREE).