<< Prev Question Next Question >>

Question 94/101

During a security assessment, a penetration tester uses a tool to capture plaintext log-in credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access. Which of the following tools is the tester using?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (101q)
Question 1: While performing reconnaissance, a penetration tester attemp...
Question 2: A previous penetration test report identified a host with vu...
Question 3: Which of the following techniques is the best way to avoid d...
Question 4: A penetration tester identifies an exposed corporate directo...
Question 5: A penetration tester wants to create a malicious QR code to ...
Question 6: A penetration tester finds an unauthenticated RCE vulnerabil...
Question 7: A penetration tester assesses an application allow list and ...
Question 8: A penetration tester obtains the following output during an ...
Question 9: A penetration tester gains access to a Windows machine and w...
Question 10: While conducting an assessment, a penetration tester identif...
Question 11: A tester enumerated a firewall policy and now needs to stage...
Question 12: Which of the following are valid reasons for including base,...
Question 13: A penetration tester is performing a network security assess...
Question 14: A penetration tester is getting ready to conduct a vulnerabi...
Question 15: During an assessment, a penetration tester wants to extend t...
Question 16: During an assessment, a penetration tester obtains an NTLM h...
Question 17: A client recently hired a penetration testing firm to conduc...
Question 18: During a vulnerability assessment, a penetration tester conf...
Question 19: During an engagement, a penetration tester runs the followin...
Question 20: A penetration tester identifies the following open ports dur...
Question 21: A company hires a penetration tester to test the security of...
Question 22: A client recently hired a penetration testing firm to conduc...
Question 23: A penetration tester is researching a path to escalate privi...
Question 24: A penetration tester finishes an initial discovery scan for ...
Question 25: A tester completed a report for a new client. Prior to shari...
Question 26: Before starting an assessment, a penetration tester needs to...
Question 27: A penetration tester attempts unauthorized entry to the comp...
Question 28: A penetration tester gains access to a Windows machine and w...
Question 29: A penetration tester needs to use the native binaries on a s...
Question 30: During a red-team exercise, a penetration tester obtains an ...
Question 31: An external legal firm is conducting a penetration test of a...
Question 32: A penetration tester needs to evaluate the order in which th...
Question 33: A tester performs a vulnerability scan and identifies severa...
Question 34: A penetration tester launches an attack against company empl...
Question 35: During an assessment, a penetration tester obtains a low-pri...
Question 36: SIMULATION Using the output, identify potential attack vecto...
Question 37: A penetration tester runs a vulnerability scan that identifi...
Question 38: During a penetration test, you gain access to a system with ...
Question 39: A penetration tester is configuring a vulnerability manageme...
Question 40: You are a security analyst tasked with hardening a web serve...
Question 41: A penetration tester is performing an assessment focused on ...
Question 42: Which of the following explains the reason a tester would op...
Question 43: Given the following script: $1 = [System.Security.Principal....
Question 44: A penetration tester successfully gained access to manage re...
Question 45: During a routine penetration test, the client's security tea...
Question 46: During a red-team exercise, a penetration tester obtains an ...
Question 47: A penetration tester completes a scan and sees the following...
Question 48: A penetration tester needs to confirm the version number of ...
Question 49: A penetration tester writes a Bash script to automate the ex...
Question 50: During a security assessment of an e-commerce website, a pen...
Question 51: A penetration tester is performing reconnaissance for a web ...
Question 52: A penetration tester observes the following output from an N...
Question 53: A penetration tester discovers data to stage and exfiltrate....
Question 54: A penetration tester gains access to a domain server and wan...
Question 55: Which of the following could be used to enhance the quality ...
Question 56: A penetration tester performs several Nmap scans against the...
Question 57: A penetration tester is evaluating a SCADA system. The teste...
Question 58: A penetration tester reviews a SAST vulnerability scan repor...
Question 59: A penetration tester gains access to the target network and ...
Question 60: A penetration tester needs to scan a remote infrastructure w...
Question 61: During host discovery, a security analyst wants to obtain Ge...
Question 62: A penetration tester is performing network reconnaissance. T...
Question 63: A penetration tester is performing a cloud-based penetration...
Question 64: Which of the following will reduce the possibility of introd...
Question 65: A penetration tester currently conducts phishing reconnaissa...
Question 66: During an external penetration test, a tester receives the f...
Question 67: A penetration tester compromises a Windows OS endpoint that ...
Question 68: A tester runs an Nmap scan against a Windows server and rece...
Question 69: A penetration tester is unable to identify the Wi-Fi SSID on...
Question 70: A penetration tester cannot complete a full vulnerability sc...
Question 71: Which of the following components should a penetration teste...
Question 72: A penetration tester performs a service enumeration process ...
Question 73: A penetration tester is trying to get unauthorized access to...
Question 74: During a penetration test, a junior tester uses Hunter.io fo...
Question 75: During a penetration testing engagement, a tester targets th...
Question 76: During a security assessment, a penetration tester wants to ...
Question 77: A penetration tester is performing an authorized physical as...
Question 78: Which of the following describes the process of determining ...
Question 79: A penetration tester presents the following findings to stak...
Question 80: During a penetration test, the tester identifies several unu...
Question 81: A penetration tester is configuring a vulnerability manageme...
Question 82: A penetration tester attempts to run an automated web applic...
Question 83: A penetration tester is searching for vulnerabilities or mis...
Question 84: A penetration tester wants to check the security awareness o...
Question 85: During a discussion of a penetration test final report, the ...
Question 86: A penetration tester would like to leverage a CSRF vulnerabi...
Question 87: Which of the following elements of a penetration test report...
Question 88: A penetration tester needs to identify all vulnerable input ...
Question 89: A company hires a penetration tester to perform an external ...
Question 90: During an internal penetration test, a tester compromises a ...
Question 91: A penetration tester creates a list of target domains that r...
Question 92: A penetration testing team needs to determine whether it is ...
Question 93: In a cloud environment, a security team discovers that an at...
Question 94: During a security assessment, a penetration tester uses a to...
Question 95: A penetration tester executes multiple enumeration commands ...
Question 96: A penetration tester is compiling the final report for a rec...
Question 97: Which of the following can an access control vestibule help ...
Question 98: During a security audit, a penetration tester wants to run a...
Question 99: Which of the following techniques is the best way to avoid d...
Question 100: A penetration tester performs a service enumeration process ...
Question 101: A penetration tester is conducting reconnaissance for an upc...