<< Prev Question Next Question >>

Question 12/49

A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client's requirements?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (49q)
Question 1: A penetration tester is starting an assessment but only has ...
Question 2: A company's Chief Executive Officer has created a secondary ...
Question 3: A company that developers embedded software for the automobi...
Question 4: A penetration tester who is conducting a web-application tes...
Question 5: Which of the following should a penetration tester do NEXT a...
Question 6: A penetration tester exploited a unique flaw on a recent pen...
Question 7: A tester who is performing a penetration test on a website r...
Question 8: A penetration tester would like to obtain FTP credentials by...
Question 9: A penetration tester is scanning a corporate lab network for...
Question 10: A penetration tester is able to capture the NTLM challenge-r...
Question 11: A company hired a penetration-testing team to review the cyb...
Question 12: A large client wants a penetration tester to scan for device...
Question 13: Which of the following describe the GREATEST concerns about ...
Question 14: A penetration tester has established an on-path attack posit...
Question 15: A penetration tester is exploring a client's website. The te...
Question 16: User credentials were captured from a database during an ass...
Question 17: A penetration tester conducted a vulnerability scan against ...
Question 18: In an unprotected network file repository, a penetration tes...
Question 19: A company obtained permission for a vulnerability scan from ...
Question 20: A penetration tester has obtained a low-privilege shell on a...
Question 21: A company recruited a penetration tester to configure wirele...
Question 22: A penetration tester wants to scan a target network without ...
Question 23: A company is concerned that its cloud service provider is no...
Question 24: In the process of active service enumeration, a penetration ...
Question 25: Which of the following would MOST likely be included in the ...
Question 26: A penetration tester was able to gather MD5 hashes from a se...
Question 27: A penetration tester conducted a discovery scan that generat...
Question 28: A consultant is reviewing the following output after reports...
Question 29: A penetration tester is explaining the MITRE ATT&amp;CK fram...
Question 30: A Chief Information Security Officer wants a penetration tes...
Question 31: A penetration tester is preparing to perform activities for ...
Question 32: A penetration tester has completed an analysis of the variou...
Question 33: During a penetration test, you gain access to a system with ...
Question 34: A penetration tester is testing a web application that is ho...
Question 35: A penetration-testing team is conducting a physical penetrat...
Question 36: A penetration tester needs to perform a test on a finance sy...
Question 37: A penetration tester was conducting a penetration test and d...
Question 38: You are a penetration tester reviewing a client's website th...
Question 39: A penetration tester completed a vulnerability scan against ...
Question 40: Which of the following web-application security risks are pa...
Question 41: A penetration tester recently performed a social-engineering...
Question 42: Which of the following should a penetration tester consider ...
Question 43: A penetration tester is reviewing the following SOW prior to...
Question 44: The following line-numbered Python code snippet is being use...
Question 45: A mail service company has hired a penetration tester to con...
Question 46: Given the following output: User-agent:* Disallow: /author/ ...
Question 47: Which of the following are the MOST important items to inclu...
Question 48: A penetration tester logs in as a user in the cloud environm...
Question 49: A penetration tester conducts an Nmap scan against a target ...