During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:
A penetration tester has gained access to the Chief Executive Officer's (CEO's) internal, corporate email. The next objective is to gain access to the network.
Which of the following methods will MOST likely work?
Which of the following documents describes activities that are prohibited during a scheduled penetration test?
A penetration tester receives the following results from an Nmap scan:
Which of the following OSs is the target MOST likely running?
Which of the following assessment methods is MOST likely to cause harm to an ICS environment?
A penetration tester wrote the following Bash script to brute force a local service password:
..ting as expected. Which of the following changes should the penetration tester make to get the script to work?
A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?
A penetration tester initiated the transfer of a large data set to verify a proof-of-concept attack as permitted by the ROE. The tester noticed the client's data included PII, which is out of scope, and immediately stopped the transfer. Which of the following MOST likely explains the penetration tester's decision?
Which of the following is the MOST important information to have on a penetration testing report that is written for the developers?
An Nmap scan of a network switch reveals the following:
Which of the following technical controls will most likely be the FIRST recommendation for this device?