Question 1

A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:
* Have a full TCP connection
* Send a "hello" payload
* Walt for a response
* Send a string of characters longer than 16 bytes
Which of the following approaches would BEST support the objective?
  • Question 2

    Which of the following expressions in Python increase a variable val by one (Choose two.)
  • Question 3

    A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen.
    A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?
  • Question 4

    A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
  • Question 5

    A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?