Question 6

A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial dat a. Which of the following should the tester do with this information to make this a successful exploit?
  • Question 7

    A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client's requirements?
  • Question 8

    In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: <name- serial_number>. Which of the following would be the best action for the tester to take NEXT with this information?
  • Question 9

    Given the following output:
    User-agent:*
    Disallow: /author/
    Disallow: /xmlrpc.php
    Disallow: /wp-admin
    Disallow: /page/
    During which of the following activities was this output MOST likely obtained?
  • Question 10

    A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary dat a. The penetration testers have been given an internal network starting position.
    Which of the following actions, if performed, would be ethical within the scope of the assessment?