<< Prev Question Next Question >>

Question 58/162

During an engagement, a penetration tester found the following list of strings inside a file:

Which of the following is the BEST technique to determine the known plaintext of the strings?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (162q)
Question 1: A penetration tester is able to capture the NTLM challenge-r...
Question 2: Given the following code: (Exhibit) Which of the following d...
Question 3: A penetration tester was brute forcing an internal web serve...
Question 4: A penetration tester is starting an assessment but only has ...
Question 5: Which of the following tools would be BEST suited to perform...
Question 6: Which of the following documents describes activities that a...
Question 7: A penetration tester was conducting a penetration test and d...
Question 8: A private investigation firm is requesting a penetration tes...
Question 9: A red team gained access to the internal network of a client...
Question 10: A penetration tester analyzed a web-application log file and...
Question 11: Which of the following assessment methods is MOST likely to ...
Question 12: An assessor wants to run an Nmap scan as quietly as possible...
Question 13: A penetration tester is evaluating a company's network perim...
Question 14: During a penetration test, you gain access to a system with ...
Question 15: A penetration tester ran a ping -A command during an unknown...
Question 16: After running the enum4linux.pl command, a penetration teste...
Question 17: A penetration tester runs the following command: l.comptia.l...
Question 18: Which of the following tools would be the best to use to int...
Question 19: You are a penetration tester running port scans on a server....
Question 20: A penetration tester runs a scan against a server and obtain...
Question 21: A client would like to have a penetration test performed tha...
Question 22: In an unprotected network file repository, a penetration tes...
Question 23: A penetration tester is conducting an authorized, physical p...
Question 24: A penetration tester wrote the following comment in the fina...
Question 25: A security professional wants to test an IoT device by sendi...
Question 26: A penetration tester initiated the transfer of a large data ...
Question 27: During an assessment, a penetration tester gathered OSINT fo...
Question 28: Which of the following would assist a penetration tester the...
Question 29: During an internal penetration test against a company, a pen...
Question 30: Deconfliction is necessary when the penetration test:...
Question 31: Which of the following assessment methods is the most likely...
Question 32: Which of the following is the MOST important information to ...
Question 33: A penetration tester is conducting an engagement against an ...
Question 34: A compliance-based penetration test is primarily concerned w...
Question 35: Which of the following web-application security risks are pa...
Question 36: A penetration tester is required to perform a vulnerability ...
Question 37: A penetration tester who is conducting a vulnerability asses...
Question 38: A penetration tester writes the following script: (Exhibit) ...
Question 39: A security firm is discussing the results of a penetration t...
Question 40: A penetration tester was able to gather MD5 hashes from a se...
Question 41: Which of the following are the MOST important items to inclu...
Question 42: A penetration tester wants to perform reconnaissance without...
Question 43: SIMULATION Using the output, identify potential attack vecto...
Question 44: A penetration tester is testing a web application that is ho...
Question 45: A penetration tester has been hired to configure and conduct...
Question 46: A penetration tester attempted a DNS poisoning attack. After...
Question 47: When preparing for an engagement with an enterprise organiza...
Question 48: A penetration tester wrote the following script to be used i...
Question 49: Which of the following is a regulatory compliance standard t...
Question 50: A company is concerned that its cloud VM is vulnerable to a ...
Question 51: Penetration tester has discovered an unknown Linux 64-bit ex...
Question 52: A penetration tester successfully performed an exploit on a ...
Question 53: A penetration tester was able to compromise a server and esc...
Question 54: The results of an Nmap scan are as follows: Starting Nmap 7....
Question 55: A penetration tester is reviewing the following DNS reconnai...
Question 56: A security company has been contracted to perform a scoped i...
Question 57: A penetration tester is testing a new API for the company's ...
Question 58: During an engagement, a penetration tester found the followi...
Question 59: A company has recruited a penetration tester to conduct a vu...
Question 60: After gaining access to a previous system, a penetration tes...
Question 61: A company that developers embedded software for the automobi...
Question 62: Which of the following should a penetration tester consider ...
Question 63: A penetration tester opened a shell on a laptop at a client'...
Question 64: A software development team is concerned that a new product'...
Question 65: A consulting company is completing the ROE during scoping. W...
Question 66: A penetration tester opened a reverse shell on a Linux web s...
Question 67: For a penetration test engagement, a security engineer decid...
Question 68: A penetration tester received a .pcap file to look for crede...
Question 69: During a penetration test, a tester is in close proximity to...
Question 70: A penetration tester ran an Nmap scan on an Internet-facing ...
Question 71: Which of the following would a company's hunt team be MOST i...
Question 72: A company recruited a penetration tester to configure wirele...
Question 73: When developing a shell script intended for interpretation i...
Question 74: Which of the following describe the GREATEST concerns about ...
Question 75: A penetration tester is able to use a command injection vuln...
Question 76: You are a penetration tester reviewing a client's website th...
Question 77: A penetration tester recently performed a social-engineering...
Question 78: A company that requires minimal disruption to its daily acti...
Question 79: A penetration tester is conducting an unknown environment te...
Question 80: Which of the following documents must be signed between the ...
Question 81: An Nmap network scan has found five open ports with identifi...
Question 82: A penetration tester created the following script to use in ...
Question 83: A penetration tester found several critical SQL injection vu...
Question 84: In the process of active service enumeration, a penetration ...
Question 85: A penetration tester has extracted password hashes from the ...
Question 86: A penetration tester who is performing a physical assessment...
Question 87: A penetration tester downloaded a Java application file from...
Question 88: A penetration tester received a 16-bit network block that wa...
Question 89: A penetration tester recently completed a review of the secu...
Question 90: A penetration tester has been hired to perform a physical pe...
Question 91: While performing the scanning phase of a penetration test, t...
Question 92: A penetration tester performs the following command: curl -I...
Question 93: Appending string values onto another string is called:...
Question 94: A company obtained permission for a vulnerability scan from ...
Question 95: A penetration tester breaks into a company's office building...
Question 96: A penetration tester has obtained root access to a Linux-bas...
Question 97: Which of the following is the most important aspect to consi...
Question 98: A penetration tester who is performing an engagement notices...
Question 99: A penetration tester managed to exploit a vulnerability usin...
Question 100: An organization wants to identify whether a less secure prot...
Question 101: During an assessment, a penetration tester inspected a log a...
Question 102: A penetration tester has gained access to the Chief Executiv...
Question 103: A penetration tester discovered a code repository and notice...
Question 104: A penetration tester gains access to a system and is able to...
Question 105: A penetration tester captured the following traffic during a...
Question 106: A penetration tester has completed an analysis of the variou...
Question 107: After compromising a system, a penetration tester wants more...
Question 108: A red team completed an engagement and provided the followin...
Question 109: A company has hired a penetration tester to deploy and set u...
Question 110: A Chief Information Security Officer wants to evaluate the s...
Question 111: A penetration tester conducted an assessment on a web server...
Question 112: A new security firm is onboarding its first client. The clie...
Question 113: A mail service company has hired a penetration tester to con...
Question 114: The attacking machine is on the same LAN segment as the targ...
Question 115: A penetration tester is working on a scoping document with a...
Question 116: During enumeration, a red team discovered that an external w...
Question 117: A security firm has been hired to perform an external penetr...
Question 118: A penetration-testing team is conducting a physical penetrat...
Question 119: Which of the following commands will allow a penetration tes...
Question 120: A consultant is reviewing the following output after reports...
Question 121: A penetration tester completed an assessment, removed all ar...
Question 122: Which of the following types of information should be includ...
Question 123: A penetration tester exploited a vulnerability on a server a...
Question 124: An assessment has been completed, and all reports and eviden...
Question 125: A penetration tester conducted a vulnerability scan against ...
Question 126: A penetration tester executes the following Nmap command and...
Question 127: A security analyst is conducting an unknown environment test...
Question 128: A client wants a security assessment company to perform a pe...
Question 129: Given the following output: User-agent:* Disallow: /author/ ...
Question 130: A company hired a penetration-testing team to review the cyb...
Question 131: A penetration tester is contracted to attack an oil rig netw...
Question 132: Within a Python script, a line that states print (var) outpu...
Question 133: A penetration tester, who is doing an assessment, discovers ...
Question 134: Which of the following assessment methods is MOST likely to ...
Question 135: A penetration tester was able to gain access to a system usi...
Question 136: A penetration tester finds a PHP script used by a web applic...
Question 137: A penetration tester is explaining the MITRE ATT&amp;CK fram...
Question 138: Which of the following situations would MOST likely warrant ...
Question 139: A company's Chief Executive Officer has created a secondary ...
Question 140: When planning a penetration-testing effort, clearly expressi...
Question 141: A penetration tester wants to test a list of common password...
Question 142: The provision that defines the level of responsibility betwe...
Question 143: The delivery of a penetration test within an organization re...
Question 144: Penetration tester is developing exploits to attack multiple...
Question 145: In Python socket programming, SOCK_DGRAM type is:...
Question 146: Which of the following types of assessments MOST likely focu...
Question 147: A penetration tester was contracted to test a proprietary ap...
Question 148: An exploit developer is coding a script that submits a very ...
Question 149: A penetration tester is cleaning up and covering tracks at t...
Question 150: The output from a penetration testing tool shows 100 hosts c...
Question 151: An Nmap scan of a network switch reveals the following: (Exh...
Question 152: A company requires that all hypervisors have the latest avai...
Question 153: A company hired a penetration tester to do a social-engineer...
Question 154: A penetration tester ran a simple Python-based scanner. The ...
Question 155: During the assessment of a client's cloud and on-premises en...
Question 156: During a code review assessment, a penetration tester finds ...
Question 157: During an assessment, a penetration tester found a suspiciou...
Question 158: Which of the following tools provides Python classes for int...
Question 159: The following PowerShell snippet was extracted from a log of...
Question 160: A tester who is performing a penetration test on a website r...
Question 161: Which of the following tools would bebestsuited to perform a...
Question 162: A penetration tester will be performing a vulnerability scan...