Question 61

A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider's metadata and get the credentials used by the instance to authenticate itself. Which of the following vulnerabilities has the tester exploited?
  • Question 62

    A penetration tester has established an on-path attack position and must now specially craft a DNS query response to be sent back to a target host. Which of the following utilities would BEST support this objective?
  • Question 63

    A penetration tester conducted a discovery scan that generated the following:

    Which of the following commands generated the results above and will transform them into a list of active hosts for further analysis?
  • Question 64

    During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.
    INSTRUCTIONS
    Analyze the code segments to determine which sections are needed to complete a port scanning script.
    Drag the appropriate elements into the correct locations to complete the script.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 65

    Which of the following describe the GREATEST concerns about using third-party open-source libraries in application code? (Choose two.)