<< Prev Question Next Question >>

Question 75/107

A penetration tester cannot complete a full vulnerability scan because the client's WAF is blocking communications. During which of the following activities should the penetration tester discuss this issue with the client?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (107q)
Question 1: A penetration tester successfully gained access to manage re...
Question 2: During host discovery, a security analyst wants to obtain Ge...
Question 3: A penetration tester needs to identify all vulnerable input ...
Question 4: A penetration tester finds that an application responds with...
Question 5: While performing a penetration test, a tester executes the f...
Question 6: A penetration tester is performing an authorized physical as...
Question 7: During a penetration testing engagement, a tester targets th...
Question 8: A penetration tester needs to test a very large number of UR...
Question 9: Which of the following elements of a penetration test report...
Question 10: As part of an engagement, a penetration tester wants to main...
Question 11: During a red-team exercise, a penetration tester obtains an ...
Question 12: A tester is finishing an engagement and needs to ensure that...
Question 13: Which of the following techniques is the best way to avoid d...
Question 14: A penetration tester finishes a security scan and uncovers n...
Question 15: A penetration tester creates a list of target domains that r...
Question 16: During a penetration test, you gain access to a system with ...
Question 17: A penetration tester wants to use PowerView in an AD environ...
Question 18: A penetration tester is evaluating a SCADA system. The teste...
Question 19: A penetration tester is compiling the final report for a rec...
Question 20: During an engagement, a penetration tester runs the followin...
Question 21: You are a penetration tester running port scans on a server....
Question 22: A penetration tester obtains password dumps associated with ...
Question 23: A penetration tester attempts to run an automated web applic...
Question 24: A penetration tester launches an attack against company empl...
Question 25: A penetration tester discovers evidence of an advanced persi...
Question 26: A penetration tester identifies an exposed corporate directo...
Question 27: A penetration tester writes the following script, which is d...
Question 28: During a penetration test, the tester gains full access to t...
Question 29: A company hires a penetration tester to perform an external ...
Question 30: A penetration tester attempts unauthorized entry to the comp...
Question 31: A penetration tester gains access to a Windows machine and w...
Question 32: A penetration tester gains access to a host but does not hav...
Question 33: You are a penetration tester reviewing a client's website th...
Question 34: A penetration tester has discovered sensitive files on a sys...
Question 35: A penetration tester writes the following script to enumerat...
Question 36: Which of the following is the most efficient way to infiltra...
Question 37: A penetration tester performs a service enumeration process ...
Question 38: A penetration tester finds it is possible to downgrade a web...
Question 39: A penetration tester has adversely affected a critical syste...
Question 40: During an assessment, a penetration tester manages to get RD...
Question 41: Which of the following is within the scope of proper handlin...
Question 42: A penetration tester needs to evaluate the order in which th...
Question 43: A penetration tester is conducting a wireless security asses...
Question 44: A penetration tester observes the following output from an N...
Question 45: While performing reconnaissance, a penetration tester attemp...
Question 46: A penetration tester is attempting to exfiltrate sensitive d...
Question 47: A penetration tester has been asked to conduct a blind web a...
Question 48: The following file was obtained during reconnaissance: (Exhi...
Question 49: During a security audit, a penetration tester wants to run a...
Question 50: During a penetration test, a tester captures information abo...
Question 51: A penetration tester wants to create a malicious QR code to ...
Question 52: During an assessment, a penetration tester obtains a low-pri...
Question 53: A penetration tester discovers data to stage and exfiltrate....
Question 54: A tester completed a report for a new client. Prior to shari...
Question 55: A penetration tester identifies the following open ports dur...
Question 56: A tester plans to perform an attack technique over a comprom...
Question 57: While conducting a peer review for a recent assessment, a pe...
Question 58: A penetration tester plans to conduct reconnaissance during ...
Question 59: During an engagement, a penetration tester wants to enumerat...
Question 60: During a security assessment for an internal corporate netwo...
Question 61: A penetration tester gains initial access to an endpoint and...
Question 62: A penetration tester has found a web application that is run...
Question 63: A penetration tester currently conducts phishing reconnaissa...
Question 64: A penetration tester is enumerating a Linux system. The goal...
Question 65: During an external penetration test, a tester receives the f...
Question 66: A client warns the assessment team that an ICS application i...
Question 67: A penetration tester established an initial compromise on a ...
Question 68: Which of the following is most important when communicating ...
Question 69: A penetration tester is researching a path to escalate privi...
Question 70: A penetration tester completes a scan and sees the following...
Question 71: As part of a security audit, a penetration tester finds an i...
Question 72: A company hires a penetration tester to test the security im...
Question 73: Which of the following post-exploitation activities allows a...
Question 74: A penetration tester needs to launch an Nmap scan to find th...
Question 75: A penetration tester cannot complete a full vulnerability sc...
Question 76: Which of the following is the most efficient way to exfiltra...
Question 77: During an assessment, a penetration tester obtains an NTLM h...
Question 78: During an engagement, a penetration tester needs to break th...
Question 79: A penetration tester reviews a SAST vulnerability scan repor...
Question 80: A penetration tester is attempting to discover vulnerabiliti...
Question 81: A penetration tester finds an unauthenticated RCE vulnerabil...
Question 82: Which of the following activities should be performed to pre...
Question 83: A penetration tester is performing network reconnaissance. T...
Question 84: A penetration tester wants to use the following Bash script ...
Question 85: While conducting an assessment, a penetration tester identif...
Question 86: A penetration tester obtains the following output during an ...
Question 87: A penetration tester wants to use multiple TTPs to assess th...
Question 88: During a pre-engagement activity with a new customer, a pene...
Question 89: During a penetration test, a tester compromises a Windows co...
Question 90: After a recent penetration test was conducted by the company...
Question 91: A penetration tester wants to send a specific network packet...
Question 92: During a penetration test, a tester attempts to pivot from o...
Question 93: A penetration tester needs to collect information over the n...
Question 94: A penetration tester needs to use the native binaries on a s...
Question 95: During a penetration test, a junior tester uses Hunter.io fo...
Question 96: During an internal penetration test, a tester compromises a ...
Question 97: A tester performs a vulnerability scan and identifies severa...
Question 98: A penetration tester assesses an application allow list and ...
Question 99: During a testing engagement, a penetration tester compromise...
Question 100: A penetration tester is conducting reconnaissance for an upc...
Question 101: A tester wants to pivot from a compromised host to another n...
Question 102: A penetration tester downloads a JAR file that is used in an...
Question 103: A penetration tester is getting ready to conduct a vulnerabi...
Question 104: Which of the following are valid reasons for including base,...
Question 105: In a cloud environment, a security team discovers that an at...
Question 106: A penetration tester gains access to the target network and ...
Question 107: A penetration testing team wants to conduct DNS lookups for ...