Question 11

A consulting company is completing the ROE during scoping.
Which of the following should be included in the ROE?
  • Question 12

    When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?
  • Question 13

    A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:
    Have a full TCP connection
    Send a "hello" payload
    Walt for a response
    Send a string of characters longer than 16 bytes
    Which of the following approaches would BEST support the objective?
  • Question 14

    Which of the following describes the reason why a penetration tester would run the command sdelete mimikatz. * on a Windows server that the tester compromised?
  • Question 15

    A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service. Which of the following methods would BEST support validation of the possible findings?