Question 16

A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active. Which of the following commands should be used to accomplish the goal?
  • Question 17

    A penetration tester conducted a vulnerability scan against a client's critical servers and found the following:

    Which of the following would be a recommendation for remediation?
  • Question 18

    A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant.
    The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?
  • Question 19

    Penetration-testing activities have concluded, and the initial findings have been reviewed with the client.
    Which of the following best describes the NEXT step in the engagement?
  • Question 20

    A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability.
    Which of the following is the BEST way to ensure this is a true positive?