Question 141

A penetration tester is attempting to scan a legacy web application using the scanner's default scan settings. The scans continually result in the application becoming unresponsive. Which of the following can help to alleviate this issue?
  • Question 142

    A penetration tester has a full shell to a domain controller and wants to discover any user account that has not authenticated to the domain in 21 days. Which of the following commands would BEST accomplish this?
  • Question 143

    DRAG DROP
    During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.
    INSTRUCTIONS:
    Analyze the code segments to determine which sections are needed to complete a port scanning script.
    Drag the appropriate elements into the correct locations to complete the script.

    Question 144

    A penetration tester observes that several high numbered ports are listening on a public web server. However, the system owner says the application only uses port 443. Which of the following would be BEST to recommend?
  • Question 145

    A penetration tester is performing ARP spoofing against a switch. Which of the following should the penetration tester spoof to get the MOST information?