<< Prev Question Next Question >>

Question 73/103

A penetration tester writes a Bash script to automate the execution of a ping command on a Class C network:
for var in --MISSING TEXT-- do
ping -c 1 192.168.10.$var
done
Which of the following pieces of code should the penetration tester use in place of -MISSING TEXT-?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
1 commentQuestion 1: A penetration tester finished a security scan and uncovered ...
Question 2: A penetration tester would like to leverage a CSRF vulnerabi...
Question 3: SIMULATION Using the output, identify potential attack vecto...
Question 4: A penetration tester is conducting reconnaissance on a targe...
Question 5: A penetration tester attempts unauthorized entry to the comp...
Question 6: A penetration tester is developing the rules of engagement f...
Question 7: During a pre-engagement activity with a new customer, a pene...
Question 8: During an assessment, a penetration tester gains access to o...
Question 9: During a penetration test, a tester compromises a Windows co...
Question 10: A tester enumerated a firewall policy and now needs to stage...
Question 11: A penetration tester compromises a Windows OS endpoint that ...
Question 12: During the reconnaissance phase, a penetration tester collec...
Question 13: A company wants to perform a BAS (Breach and Attack Simu-lat...
Question 14: A penetration tester finishes a security scan and uncovers n...
Question 15: Which of the following post-exploitation activities allows a...
Question 16: A penetration tester is ready to add shellcode for a specifi...
Question 17: A penetration testing team wants to conduct DNS lookups for ...
Question 18: A penetration tester is performing an authorized physical as...
Question 19: A penetration tester gains access to a Windows machine and w...
Question 20: A penetration tester successfully gained access to manage re...
Question 21: A penetration tester is working on a security assessment of ...
Question 22: A client warns the assessment team that an ICS application i...
Question 23: A penetration tester finds an unauthenticated RCE vulnerabil...
Question 24: You are a penetration tester running port scans on a server....
Question 25: Which of the following is the most efficient way to exfiltra...
Question 26: A tester is finishing an engagement and needs to ensure that...
Question 27: During a security assessment for an internal corporate netwo...
Question 28: An external legal firm is conducting a penetration test of a...
Question 29: As part of a security audit, a penetration tester finds an i...
Question 30: Which of the following will reduce the possibility of introd...
Question 31: A penetration tester is preparing a password-spraying attack...
Question 32: During an assessment, a penetration tester obtains an NTLM h...
Question 33: A penetration tester writes the following script to enumerat...
Question 34: A penetration tester identifies an exposed corporate directo...
Question 35: A penetration tester has found a web application that is run...
Question 36: During a penetration test, you gain access to a system with ...
Question 37: A penetration tester conducts reconnaissance for a client's ...
Question 38: A penetration tester successfully clones a source code repos...
Question 39: During a penetration test, a junior tester uses Hunter.io fo...
Question 40: A tester is working on an engagement that has evasion and st...
Question 41: During a security assessment, a penetration tester uses a to...
Question 42: Which of the following is most important when communicating ...
Question 43: A penetration tester downloads a JAR file that is used in an...
Question 44: A penetration tester is unable to identify the Wi-Fi SSID on...
Question 45: During an external penetration test, a tester receives the f...
Question 46: Which of the following OT protocols sends information in cle...
Question 47: A penetration tester completes a scan and sees the following...
Question 48: During an assessment, a penetration tester obtains a low-pri...
Question 49: During host discovery, a security analyst wants to obtain Ge...
Question 50: A tester gains initial access to a server and needs to enume...
Question 51: A penetration tester attempts to run an automated web applic...
Question 52: During an assessment, a penetration tester exploits an SQLi ...
Question 53: A penetration tester reviews a SAST vulnerability scan repor...
Question 54: A penetration tester finds that an application responds with...
Question 55: A penetration tester needs to evaluate the order in which th...
Question 56: A tester compromises a target host and then wants to maintai...
Question 57: A penetration tester is conducting a vulnerability scan. The...
Question 58: Which of the following protocols would a penetration tester ...
Question 59: Which of the following methods should a physical penetration...
Question 60: A penetration tester needs to identify all vulnerable input ...
Question 61: A penetration tester has adversely affected a critical syste...
Question 62: While performing a penetration testing exercise, a tester ex...
Question 63: Given the following script: $1 = [System.Security.Principal....
Question 64: In a cloud environment, a security team discovers that an at...
Question 65: While conducting an assessment, a penetration tester identif...
Question 66: A penetration tester identifies the URL for an internal admi...
Question 67: Which of the following could be used to enhance the quality ...
Question 68: A penetration tester gains initial access to an endpoint and...
Question 69: A penetration tester has been asked to conduct a blind web a...
Question 70: A penetration tester completes a scan and sees the following...
Question 71: During an engagement, a penetration tester wants to enumerat...
Question 72: A penetration tester is researching a path to escalate privi...
Question 73: A penetration tester writes a Bash script to automate the ex...
Question 74: A penetration tester wants to check the security awareness o...
Question 75: Which of the following tasks would ensure the key outputs fr...
Question 76: During an assessment, a penetration tester plans to gather m...
Question 77: Which of the following technologies is most likely used with...
Question 78: Which of the following elements of a penetration test report...
Question 79: Which of the following activities should be performed to pre...
Question 80: A consultant starts a network penetration test. The consulta...
Question 81: A penetration tester is attempting to discover vulnerabiliti...
Question 82: During a vulnerability assessment, a penetration tester conf...
Question 83: Given the following statements: * Implement a web applicatio...
Question 84: A penetration tester gains initial access to a target system...
Question 85: During an engagement, a penetration tester needs to break th...
Question 86: While performing an internal assessment, a tester uses the f...
Question 87: Which of the following is within the scope of proper handlin...
Question 88: With one day left to complete the testing phase of an engage...
Question 89: A penetration tester is conducting an assessment of a web ap...
Question 90: During a penetration test, the tester uses a vulnerability s...
Question 91: A penetration tester needs to confirm the version number of ...
Question 92: A penetration tester is trying to get unauthorized access to...
Question 93: A penetration tester identifies the following open ports dur...
Question 94: Which of the following is within the scope of proper handlin...
Question 95: During an assessment, a penetration tester manages to get RD...
Question 96: A penetration tester is testing a power plant's network and ...
Question 97: A penetration tester is authorized to perform a DoS attack a...
Question 98: During a security assessment, a penetration tester gains acc...
Question 99: During a security audit, a penetration tester wants to run a...
Question 100: During a penetration test, the tester identifies several unu...
Question 101: Which of the following is the most efficient way to infiltra...
Question 102: A penetration tester presents the following findings to stak...
Question 103: As part of an engagement, a penetration tester wants to main...