<< Prev Question Next Question >>

Question 23/39

A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider's metadata and get the credentials used by the instance to authenticate itself. Which of the following vulnerabilities has the tester exploited?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (39q)
Question 1: A company that requires minimal disruption to its daily acti...
Question 2: Appending string values onto another string is called:...
Question 3: A security engineer identified a new server on the network a...
2 commentQuestion 4: A penetration tester writes the following script: (Exhibit) ...
Question 5: A penetration tester is working on a scoping document with a...
1 commentQuestion 6: Which of the following should a penetration tester consider ...
Question 7: A company conducted a simulated phishing attack by sending i...
Question 8: You are a penetration tester running port scans on a server....
Question 9: A penetration tester obtained the following results after sc...
Question 10: A penetration tester who is doing a company-requested assess...
Question 11: A penetration tester has been given eight business hours to ...
Question 12: A penetration tester has obtained a low-privilege shell on a...
Question 13: A company is concerned that its cloud VM is vulnerable to a ...
Question 14: A penetration tester is scanning a corporate lab network for...
Question 15: During a penetration-testing engagement, a consultant perfor...
Question 16: A penetration tester discovers during a recent test that an ...
Question 17: A company becomes concerned when the security alarms are tri...
Question 18: A penetration tester runs the unshadow command on a machine....
Question 19: A consultant is reviewing the following output after reports...
2 commentQuestion 20: You are a security analyst tasked with hardening a web serve...
Question 21: A penetration tester has been contracted to review wireless ...
Question 22: A tester who is performing a penetration test on a website r...
Question 23: A penetration tester is testing a web application that is ho...
Question 24: Running a vulnerability scanner on a hybrid network segment ...
Question 25: A penetration tester ran the following command on a staging ...
Question 26: Which of the following documents describes specific activiti...
Question 27: Performing a penetration test against an environment with SC...
Question 28: A penetration tester was able to gain access to a system usi...
Question 29: In the process of active service enumeration, a penetration ...
Question 30: A penetration tester has completed an analysis of the variou...
Question 31: A company that developers embedded software for the automobi...
Question 32: A penetration tester has identified several newly released C...
Question 33: A penetration tester wants to identify CVEs that can be leve...
Question 34: Which of the following is the MOST effective person to valid...
Question 35: A company hired a penetration-testing team to review the cyb...
Question 36: A software development team is concerned that a new product'...
Question 37: A penetration tester is testing input validation on a search...
Question 38: A penetration tester discovers a vulnerable web server at 10...
Question 39: Which of the following should a penetration tester do NEXT a...