<< Prev Question Next Question >>

Question 44/49

A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider's metadata and get the credentials used by the instance to authenticate itself. Which of the following vulnerabilities has the tester exploited?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (49q)
Question 1: A penetration tester has obtained shell access to a Windows ...
Question 2: A client has requested that the penetration test scan includ...
Question 3: A security professional wants to test an IoT device by sendi...
Question 4: A penetration tester wants to identify CVEs that can be leve...
Question 5: A company hired a penetration tester to do a social-engineer...
Question 6: A consultant is reviewing the following output after reports...
Question 7: A company becomes concerned when the security alarms are tri...
Question 8: A penetration tester was able to gain access successfully to...
Question 9: A penetration tester was able to gain access to a system usi...
Question 10: A penetration tester has identified several newly released C...
Question 11: A penetration tester has been hired to configure and conduct...
Question 12: A red-team tester has been contracted to emulate the threat ...
Question 13: A penetration tester gains access to a system and establishe...
Question 14: Which of the following tools would be MOST useful in collect...
Question 15: A company obtained permission for a vulnerability scan from ...
Question 16: Which of the following commands will allow a penetration tes...
Question 17: A software development team is concerned that a new product'...
Question 18: In an unprotected network file repository, a penetration tes...
Question 19: A penetration tester is able to capture the NTLM challenge-r...
Question 20: A penetration tester who is conducting a vulnerability asses...
Question 21: You are a security analyst tasked with hardening a web serve...
Question 22: A penetration tester received a .pcap file to look for crede...
Question 23: Which of the following is the MOST common vulnerability asso...
Question 24: A company that developers embedded software for the automobi...
Question 25: You are a penetration tester running port scans on a server....
Question 26: A penetration tester discovers during a recent test that an ...
Question 27: A tester who is performing a penetration test on a website r...
Question 28: A red team gained access to the internal network of a client...
Question 29: A new client hired a penetration-testing company for a month...
Question 30: A penetration tester ran a ping -A command during an unknown...
Question 31: Given the following code: &lt;SCRIPT&gt;var+img=new+Image();...
Question 32: A penetration tester discovered a vulnerability that provide...
Question 33: A company has hired a penetration tester to deploy and set u...
Question 34: A penetration tester has completed an analysis of the variou...
Question 35: Appending string values onto another string is called:...
Question 36: A penetration tester is starting an assessment but only has ...
Question 37: A company is concerned that its cloud VM is vulnerable to a ...
Question 38: A penetration tester performs the following command: curl -I...
Question 39: Which of the following BEST describes why a client would hol...
Question 40: Which of the following should a penetration tester consider ...
Question 41: A company hired a penetration-testing team to review the cyb...
Question 42: A penetration tester is preparing to perform activities for ...
Question 43: A penetration-testing team is conducting a physical penetrat...
Question 44: A penetration tester is testing a web application that is ho...
Question 45: A penetration tester who is doing a security assessment disc...
Question 46: A penetration tester runs a scan against a server and obtain...
Question 47: A penetration tester is looking for a vulnerability that ena...
Question 48: A penetration tester exploited a unique flaw on a recent pen...
Question 49: A penetration tester writes the following script: (Exhibit) ...