Question 41

A software development team is concerned that a new product's 64-bit Windows binaries can be deconstructed to the underlying code. Which of the following tools can a penetration tester utilize to help the team gauge what an attacker might see in the binaries?
  • Question 42

    A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability.
    Which of the following is the BEST way to ensure this is a true positive?
  • Question 43

    A software company has hired a penetration tester to perform a penetration test on a database server. The tester has been given a variety of tools used by the company's privacy policy. Which of the following would be the BEST to use to find vulnerabilities on this server?
  • Question 44

    A penetration tester was able to gather MD5 hashes from a server and crack the hashes easily with rainbow tables.
    Which of the following should be included as a recommendation in the remediation report?
  • Question 45

    Which of the following provides a matrix of common tactics and techniques used by attackers along with recommended mitigations?