Question 21

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?
  • Question 22

    The results of an Nmap scan are as follows:
    Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-24 01:10 EST
    Nmap scan report for ( 10.2.1.22 )
    Host is up (0.0102s latency).
    Not shown: 998 filtered ports
    Port State Service
    80/tcp open http
    |_http-title: 80F 22% RH 1009.1MB (text/html)
    |_http-slowloris-check:
    | VULNERABLE:
    | Slowloris DoS Attack
    | <..>
    Device type: bridge|general purpose
    Running (JUST GUESSING) : QEMU (95%)
    OS CPE: cpe:/a:qemu:qemu
    No exact OS matches found for host (test conditions non-ideal).
    OS detection performed. Please report any incorrect results at https://nmap.org/submit/.
    Nmap done: 1 IP address (1 host up) scanned in 107.45 seconds
    Which of the following device types will MOST likely have a similar response? (Choose two.)
  • Question 23

    A company is concerned that its cloud service provider is not adequately protecting the VMs housing its software development. The VMs are housed in a datacenter with other companies sharing physical resources. Which of the following attack types is MOST concerning to the company?
  • Question 24

    A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data.
    Which of the following should the tester verify FIRST to assess this risk?
  • Question 25

    A penetration tester is reviewing the following SOW prior to engaging with a client:
    "Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner." Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)