Question 6

A penetration tester has access to a local machine running Linux, but the account has limited privileges. Which of the following types of files could the tester BEST use for privilege escalation?
  • Question 7

    A security consultant is trying to attack a device with a previously identified user account.

    Which of the following types of attacks is being executed?
  • Question 8

    During testing, a critical vulnerability is discovered on a client's core server. Which of the following should be the NEXT action?
  • Question 9

    A penetration tester successfully exploits a Windows host and dumps the hashes Which of the following hashes can the penetration tester use to perform a pass-the-hash attack?
    A)

    B)

    C)

    D)
  • Question 10

    A security assessor is attempting to craft specialized XML files to test the security of the parsing functions during ingest into a Windows application.
    Before beginning to test the application, which of the following should the assessor request from the organization?