Question 101

A consultant is performing a social engineering attack against a client. The consultant was able to collect a number of usernames and passwords using a phishing campaign. The consultant is given credentials to log on to various employees email accounts. Given the findings, which of the following should the consultant recommend be implemented?
  • Question 102

    A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following command:
    for m in {1..254..1};do ping -c 1 192.168.101.$m; done
    Which of the following BEST describes the result of running this command?
  • Question 103

    An email sent from the Chief Executive Officer (CEO) to the Chief Financial Officer (CFO) states a wire transfer is needed to pay a new vendor. Neither is aware of the vendor, and the CEO denies ever sending the email. Which of the following types of motivation was used m this attack?
  • Question 104

    A company contracted a firm specializing in penetration testing to assess the security of a core business application. The company provided the firm with a copy of the Java bytecode. Which of the following steps must the firm take before it can run a static code analyzer?
  • Question 105

    During an internal network penetration test, a tester recovers the NTLM password hash for a user known to have full administrator privileges on a number of target systems. Efforts to crack the hash and recover the plaintext password have been unsuccessful.
    Which of the following would be the BEST target for continued exploitation efforts?