Question 1

When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?
  • Question 2

    In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers. Which of the following actions would BEST enable the tester to perform
    phishing in a later stage of the assessment?
  • Question 3

    A penetration tester performs the following command:
    curl -I -http2 https://www.comptia.org
    Which of the following snippets of output will the tester MOST likely receive?
  • Question 4

    A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key findings are as follows:
    * The following request was intercepted going to the network device:
    GET /login HTTP/1.1
    Host: 10.50.100.16
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0
    Accept-Language: en-US,en;q=0.5
    Connection: keep-alive
    Authorization: Basic WU9VUilOQU1FOnNlY3JldHBhc3N3b3jk
    * Network management interfaces are available on the production network.
    * An Nmap scan returned the following:

    Which of the following would be BEST to add to the recommendations section of the final report? (Choose two.)
  • Question 5

    A penetration tester has been given eight business hours to gain access to a client's financial system. Which of the following techniques will have the highest likelihood of success?