<< Prev Question Next Question >>

Question 71/103

During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result.
Which of the following is the best tool to use for this task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
1 commentQuestion 1: A penetration tester finished a security scan and uncovered ...
Question 2: A penetration tester would like to leverage a CSRF vulnerabi...
Question 3: SIMULATION Using the output, identify potential attack vecto...
Question 4: A penetration tester is conducting reconnaissance on a targe...
Question 5: A penetration tester attempts unauthorized entry to the comp...
Question 6: A penetration tester is developing the rules of engagement f...
Question 7: During a pre-engagement activity with a new customer, a pene...
Question 8: During an assessment, a penetration tester gains access to o...
Question 9: During a penetration test, a tester compromises a Windows co...
Question 10: A tester enumerated a firewall policy and now needs to stage...
Question 11: A penetration tester compromises a Windows OS endpoint that ...
Question 12: During the reconnaissance phase, a penetration tester collec...
Question 13: A company wants to perform a BAS (Breach and Attack Simu-lat...
Question 14: A penetration tester finishes a security scan and uncovers n...
Question 15: Which of the following post-exploitation activities allows a...
Question 16: A penetration tester is ready to add shellcode for a specifi...
Question 17: A penetration testing team wants to conduct DNS lookups for ...
Question 18: A penetration tester is performing an authorized physical as...
Question 19: A penetration tester gains access to a Windows machine and w...
Question 20: A penetration tester successfully gained access to manage re...
Question 21: A penetration tester is working on a security assessment of ...
Question 22: A client warns the assessment team that an ICS application i...
Question 23: A penetration tester finds an unauthenticated RCE vulnerabil...
Question 24: You are a penetration tester running port scans on a server....
Question 25: Which of the following is the most efficient way to exfiltra...
Question 26: A tester is finishing an engagement and needs to ensure that...
Question 27: During a security assessment for an internal corporate netwo...
Question 28: An external legal firm is conducting a penetration test of a...
Question 29: As part of a security audit, a penetration tester finds an i...
Question 30: Which of the following will reduce the possibility of introd...
Question 31: A penetration tester is preparing a password-spraying attack...
Question 32: During an assessment, a penetration tester obtains an NTLM h...
Question 33: A penetration tester writes the following script to enumerat...
Question 34: A penetration tester identifies an exposed corporate directo...
Question 35: A penetration tester has found a web application that is run...
Question 36: During a penetration test, you gain access to a system with ...
Question 37: A penetration tester conducts reconnaissance for a client's ...
Question 38: A penetration tester successfully clones a source code repos...
Question 39: During a penetration test, a junior tester uses Hunter.io fo...
Question 40: A tester is working on an engagement that has evasion and st...
Question 41: During a security assessment, a penetration tester uses a to...
Question 42: Which of the following is most important when communicating ...
Question 43: A penetration tester downloads a JAR file that is used in an...
Question 44: A penetration tester is unable to identify the Wi-Fi SSID on...
Question 45: During an external penetration test, a tester receives the f...
Question 46: Which of the following OT protocols sends information in cle...
Question 47: A penetration tester completes a scan and sees the following...
Question 48: During an assessment, a penetration tester obtains a low-pri...
Question 49: During host discovery, a security analyst wants to obtain Ge...
Question 50: A tester gains initial access to a server and needs to enume...
Question 51: A penetration tester attempts to run an automated web applic...
Question 52: During an assessment, a penetration tester exploits an SQLi ...
Question 53: A penetration tester reviews a SAST vulnerability scan repor...
Question 54: A penetration tester finds that an application responds with...
Question 55: A penetration tester needs to evaluate the order in which th...
Question 56: A tester compromises a target host and then wants to maintai...
Question 57: A penetration tester is conducting a vulnerability scan. The...
Question 58: Which of the following protocols would a penetration tester ...
Question 59: Which of the following methods should a physical penetration...
Question 60: A penetration tester needs to identify all vulnerable input ...
Question 61: A penetration tester has adversely affected a critical syste...
Question 62: While performing a penetration testing exercise, a tester ex...
Question 63: Given the following script: $1 = [System.Security.Principal....
Question 64: In a cloud environment, a security team discovers that an at...
Question 65: While conducting an assessment, a penetration tester identif...
Question 66: A penetration tester identifies the URL for an internal admi...
Question 67: Which of the following could be used to enhance the quality ...
Question 68: A penetration tester gains initial access to an endpoint and...
Question 69: A penetration tester has been asked to conduct a blind web a...
Question 70: A penetration tester completes a scan and sees the following...
Question 71: During an engagement, a penetration tester wants to enumerat...
Question 72: A penetration tester is researching a path to escalate privi...
Question 73: A penetration tester writes a Bash script to automate the ex...
Question 74: A penetration tester wants to check the security awareness o...
Question 75: Which of the following tasks would ensure the key outputs fr...
Question 76: During an assessment, a penetration tester plans to gather m...
Question 77: Which of the following technologies is most likely used with...
Question 78: Which of the following elements of a penetration test report...
Question 79: Which of the following activities should be performed to pre...
Question 80: A consultant starts a network penetration test. The consulta...
Question 81: A penetration tester is attempting to discover vulnerabiliti...
Question 82: During a vulnerability assessment, a penetration tester conf...
Question 83: Given the following statements: * Implement a web applicatio...
Question 84: A penetration tester gains initial access to a target system...
Question 85: During an engagement, a penetration tester needs to break th...
Question 86: While performing an internal assessment, a tester uses the f...
Question 87: Which of the following is within the scope of proper handlin...
Question 88: With one day left to complete the testing phase of an engage...
Question 89: A penetration tester is conducting an assessment of a web ap...
Question 90: During a penetration test, the tester uses a vulnerability s...
Question 91: A penetration tester needs to confirm the version number of ...
Question 92: A penetration tester is trying to get unauthorized access to...
Question 93: A penetration tester identifies the following open ports dur...
Question 94: Which of the following is within the scope of proper handlin...
Question 95: During an assessment, a penetration tester manages to get RD...
Question 96: A penetration tester is testing a power plant's network and ...
Question 97: A penetration tester is authorized to perform a DoS attack a...
Question 98: During a security assessment, a penetration tester gains acc...
Question 99: During a security audit, a penetration tester wants to run a...
Question 100: During a penetration test, the tester identifies several unu...
Question 101: Which of the following is the most efficient way to infiltra...
Question 102: A penetration tester presents the following findings to stak...
Question 103: As part of an engagement, a penetration tester wants to main...