Question 36

A penetration tester is connected to a client's local network and wants to passively identify cleartext protocols and potentially sensitive data being communicated across the network. Which of the following is the BEST approach to take?
  • Question 37

    Which of the following vulnerabilities are MOST likely to be false positives when reported by an automated scanner on a static HTML web page? (Choose two.)
  • Question 38

    A penetration tester is performing a code review against a web application Given the following URL and source code:

    Which of the following vulnerabilities is present in the code above?
  • Question 39

    A client asks a penetration tester to add more addresses to a test currently in progress. Which of the following would define the target list?
  • Question 40

    A client asks a penetration tester to add more addresses to a test currently in progress.
    Which of the following would defined the target list?