During an external vulnerability scan, the penetration tester finds that telnet, ftp, and http are
open inbound on a storage server at the customer site. This information has been relayed to the
customer after the penetration test has been completed. Which of the following is the BEST
mitigation for this vulnerability?
A. The customer should enable two-factor authentication.
B. The customer should wrap http in TLS.
C. The customer should move the services to non-standard ports.
D. The customer should use system hardening guides to close unnecessary services and ports.
correct answers D. The customer should use system hardening guides to close unnecessary
services and ports.
A penetration tester finds a username with a relative ID (RID) of 500 on a Windows device.
Which of the following privilege levels does this user have?
A. Administrator
B. User
C. Guest
D. Power user correct answers A. Administrator
A penetration tester notices the results from an external vulnerability scan are unreliable. The
same IP address has shown different vulnerabilities each time it is scanned. Which of the
following is the MOST likely cause for this?
A. The IP being scanned is a load balancer with systems behind it.
B. The vulnerability scanner is reporting false positives.
C. The customer has been patching and rolling back their updates.
, D. The vulnerability scanner is improperly configured. correct answers A. The IP being scanned
is a load balancer with systems behind it.
A web application is coded in such a way that it concatenates user input directly into a database
query:
http://example.com?page=news&ID=14
To which of the following vulnerabilities could this situation apply?
A. XML injection
B. Insecure direct object reference
C. Insecure cross-origin resource sharing
D. SQL injection correct answers D. SQL injection
Output from a static code analyzer shows a high number of null pointer issues. Which of the
following is the MOST likely cause of this issue?
A. Improper use of named pipes
B. Poor file-system integration
C. Lack of variable initialization
D. Bad socket programming correct answers C. Lack of variable initialization
A penetration tester is removing a local admin account from a target system, clearing credentials
from an exploitation framework, and purging copies of documents from the laptop that was used
to create reports. Which of the following is the penetration tester performing?
A. Attestation of findings
B. Post-engagement cleanup
C. Deception techniques
D. Remediation steps correct answers B. Post-engagement cleanup