A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
A penetration tester logs in as a user in the cloud environment of a company. Which of the following Pacu modules will enable the tester to determine the level of access of the existing user?
A penetration tester received a 16-bit network block that was scoped for an assessment. During the assessment, the tester realized no hosts were active in the provided block of IPs and reported this to the company. The company then provided an updated block of IPs to the tester. Which of the following would be the most appropriate NEXT step?
Performing a penetration test against an environment with SCADA devices brings additional safety risk because the:
Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet?
Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?
Deconfliction is necessary when the penetration test:
A penetration tester who is performing a physical assessment of a company’s security practices notices the company does not have any shredders inside the office building. Which of the following techniques would be BEST to use to gain confidential information?
A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active. Which of the following commands should be used to accomplish the goal?
A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?