<< Prev Question Next Question >>

Question 100/133

A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (133q)
Question 1: Which of the following commands will allow a penetration tes...
Question 2: Which of the following tools would be BEST suited to perform...
Question 3: A software company has hired a security consultant to assess...
Question 4: The following line-numbered Python code snippet is being use...
Question 5: A penetration tester needs to perform a test on a finance sy...
Question 6: A company has hired a penetration tester to deploy and set u...
Question 7: A penetration tester conducted a discovery scan that generat...
Question 8: A software development team is concerned that a new product'...
Question 9: A penetration tester is examining a Class C network to ident...
Question 10: A penetration tester has obtained a low-privilege shell on a...
Question 11: A penetration tester wants to perform reconnaissance without...
Question 12: A penetration tester is scanning a corporate lab network for...
Question 13: A penetration tester was able to gain access successfully to...
Question 14: A penetration tester discovers that a web server within the ...
Question 15: A penetration tester is testing a new API for the company's ...
Question 16: During an assessment, a penetration tester was able to acces...
Question 17: A tester who is performing a penetration test on a website r...
Question 18: Which of the following BEST describe the OWASP Top 10? (Choo...
Question 19: Which of the following should a penetration tester do NEXT a...
Question 20: A private investigation firm is requesting a penetration tes...
Question 21: A penetration tester recently performed a social-engineering...
Question 22: An assessment has been completed, and all reports and eviden...
Question 23: A company hired a penetration-testing team to review the cyb...
Question 24: Which of the following web-application security risks are pa...
Question 25: A penetration tester who is conducting a web-application tes...
Question 26: Which of the following BEST describes why a client would hol...
Question 27: An Nmap scan shows open ports on web servers and databases. ...
Question 28: A penetration tester recently completed a review of the secu...
Question 29: A security engineer identified a new server on the network a...
Question 30: A penetration tester recently completed a review of the secu...
Question 31: A CentOS computer was exploited during a penetration test. D...
Question 32: A company becomes concerned when the security alarms are tri...
Question 33: A penetration tester is conducting an authorized, physical p...
Question 34: A penetration tester was contracted to test a proprietary ap...
Question 35: A penetration tester runs the following command on a system:...
Question 36: A penetration tester was brute forcing an internal web serve...
Question 37: A penetration tester logs in as a user in the cloud environm...
Question 38: A security firm is discussing the results of a penetration t...
Question 39: A penetration tester utilized Nmap to scan host 64.13.134.52...
Question 40: A penetration tester wants to scan a target network without ...
Question 41: A penetration tester who is conducting a vulnerability asses...
Question 42: A penetration tester has established an on-path position bet...
Question 43: A penetration tester has been hired to configure and conduct...
Question 44: Which of the following web-application security risks are pa...
Question 45: During a penetration test, you gain access to a system with ...
Question 46: When developing a shell script intended for interpretation i...
Question 47: A client has requested that the penetration test scan includ...
Question 48: A penetration tester is cleaning up and covering tracks at t...
Question 49: A penetration tester has obtained root access to a Linux-bas...
Question 50: A penetration tester has been hired to perform a physical pe...
Question 51: A penetration tester who is conducting a web-application tes...
Question 52: A physical penetration tester needs to get inside an organiz...
Question 53: A penetration tester runs the following command on a system:...
Question 54: Which of the following would MOST likely be included in the ...
Question 55: Given the following code:&lt;SCRIPT&gt;var+img=new+Image();i...
Question 56: A penetration tester is conducting a penetration test. The t...
Question 57: A penetration tester is able to use a command injection vuln...
Question 58: A penetration tester has been contracted to review wireless ...
Question 59: A red team gained access to the internal network of a client...
Question 60: The following line-numbered Python code snippet is being use...
Question 61: The results of an Nmap scan are as follows: Starting Nmap 7....
Question 62: A company conducted a simulated phishing attack by sending i...
Question 63: A penetration tester needs to perform a vulnerability scan a...
Question 64: A penetration tester is assessing a wireless network. Althou...
Question 65: A red-team tester has been contracted to emulate the threat ...
Question 66: A penetration tester writes the following script: (Exhibit) ...
Question 67: A penetration tester is reviewing the following SOW prior to...
Question 68: A penetration tester has completed an analysis of the variou...
Question 69: You are a penetration tester reviewing a client's website th...
Question 70: A penetration tester ran an Nmap scan on an Internet-facing ...
Question 71: A penetration tester discovered a vulnerability that provide...
Question 72: A client would like to have a penetration test performed tha...
Question 73: A large client wants a penetration tester to scan for device...
Question 74: An Nmap network scan has found five open ports with identifi...
Question 75: Running a vulnerability scanner on a hybrid network segment ...
Question 76: Which of the following is the BEST resource for obtaining pa...
Question 77: A CentOS computer was exploited during a penetration test. D...
Question 78: A penetration tester conducts an Nmap scan against a target ...
Question 79: Given the following code: &lt;SCRIPT&gt;var+img=new+Image();...
Question 80: Which of the following types of information would MOST likel...
Question 81: During a penetration test, you gain access to a system with ...
Question 82: Which of the following types of assessments MOST likely focu...
Question 83: A penetration tester was able to gain access to a system usi...
Question 84: A penetration tester exploited a unique flaw on a recent pen...
Question 85: A penetration tester writes the following script: (Exhibit) ...
Question 86: A penetration tester conducted a vulnerability scan against ...
Question 87: You are a penetration tester reviewing a client's website th...
Question 88: Performing a penetration test against an environment with SC...
Question 89: A penetration tester runs a scan against a server and obtain...
Question 90: A penetration tester has obtained a low-privilege shell on a...
Question 91: The attacking machine is on the same LAN segment as the targ...
Question 92: A penetration tester gives the following command to a system...
Question 93: A penetration tester performs the following command: curl -I...
Question 94: The following line-numbered Python code snippet is being use...
Question 95: A penetration tester has been given an assignment to attack ...
Question 96: An assessor wants to use Nmap to help map out a stateful fir...
Question 97: A penetration tester runs the unshadow command on a machine....
Question 98: A company's Chief Executive Officer has created a secondary ...
Question 99: Which of the following should a penetration tester attack to...
Question 100: A penetration tester has found indicators that a privileged ...
Question 101: A company is concerned that its cloud service provider is no...
Question 102: A penetration tester needs to upload the results of a port s...
Question 103: A penetration tester wants to identify CVEs that can be leve...
Question 104: Which of the following expressions in Python increase a vari...
Question 105: A security professional wants to test an IoT device by sendi...
Question 106: A consultant is reviewing the following output after reports...
Question 107: Which of the following concepts defines the specific set of ...
Question 108: Which of the following should a penetration tester consider ...
Question 109: A penetration tester recently completed a review of the secu...
Question 110: A penetration tester was able to compromise a server and esc...
Question 111: A penetration tester has been contracted to review wireless ...
Question 112: A tester who is performing a penetration test on a website r...
Question 113: A company hired a penetration tester to do a social-engineer...
Question 114: A penetration tester has been contracted to review wireless ...
Question 115: The following PowerShell snippet was extracted from a log of...
Question 116: A security professional wants to test an IoT device by sendi...
Question 117: An assessor wants to run an Nmap scan as quietly as possible...
Question 118: You are a security analyst tasked with hardening a web serve...
Question 119: A penetration tester ran a ping -A command during an unknown...
Question 120: During an assessment, a penetration tester obtains a list of...
Question 121: A penetration tester is reviewing the following DNS reconnai...
Question 122: Which of the following types of information should be includ...
Question 123: A security firm has been hired to perform an external penetr...
Question 124: A penetration tester is reviewing the following SOW prior to...
Question 125: Which of the following assessment methods is MOST likely to ...
Question 126: A penetration tester has completed an analysis of the variou...
Question 127: A new security firm is onboarding its first client. The clie...
Question 128: A penetration tester is looking for a vulnerability that ena...
Question 129: You are a penetration tester running port scans on a server....
Question 130: Which of the following can be used to store alphanumeric dat...
Question 131: Penetration tester has discovered an unknown Linux 64-bit ex...
Question 132: A penetration tester performs the following command: curl -I...
Question 133: A tester who is performing a penetration test discovers an o...