Question 136

At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server. Which of the following BEST describes the technique that was used to obtain this information?
  • Question 137

    A malicious user wants to perform an MITM attach on a computer. The computer network configuration is given below:
    IP: 192.168.1.20
    NETMASK: 255.255.255.0
    DEFAULT GATEWAY: 192.168.1.254
    DHCP: 192.168.1.253
    DNS: 192.168.10.10, 192.168.20.10
    Which of the following commands should the malicious user execute to perform the MITM attack?
  • Question 138

    A senior employee received a suspicious email from another executive requesting an urgent wire transfer.
    Which of the following types of attacks is likely occurring?
  • Question 139

    An individual has been hired by an organization after passing a background check. The individual has been passing information to a competitor over a period of time. Which of the following classifications BEST describes the individual?
  • Question 140

    A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).