In the screen shot below, which selections would you need click in order to intercept and alter all http traffic passing through OWASP ZAP?
Answer : B
A penetration tester wishes to stop the Windows Firewall process on a remote host running
Windows Vista She issues the following commands:
Answer : C
A client with 7200 employees in 14 cities (all connected via high speed WAN connections) has suffered a major external security breach via a desktop which cost them more than SI
72.000 and the loss of a high profile client. They ask you to perform a desktop vulnerability assessment to identify everything that needs to be patched. Using Nessus you find tens of thousands of vulnerabilities that need to be patched. In the report you find workstations running several Windows OS versions and service pack levels, anti-virus software from multiple vendors several major browser versions and different versions of Acrobat Reader.
Which of the following recommendations should you provide with the report?
Answer : C
Analyze the command output below, what action is being performed by the tester?
Answer : C
By default Active Directory Controllers store password representations in which file?
Answer : A
Reference:
http://www.scribd.com/doc/212238158/Windows-Administrator-L2-Interview-Question-
System-Administrator#scribd -
When sniffing wireless frames, the interface mode plays a key role in successfully collecting traffic. Which of the mode or modes are best used for sniffing wireless traffic?
Answer : A
Reference:
http://www.willhackforsushi.com/books/377_eth_2e_06.pdf
What is the MOST important document to obtain before beginning any penetration testing?
Answer : A
Reference:
Before starting a penetration test, all targets must be identified. These targets should be obtained from the customer during the initial questionnaire phase. Targets can be given in the form of specific IP addresses, network ranges, or domain names by the customer. In some instances, the only target the customer provides is the name of the organization and expects the testers be able to identify the rest on their own. It is important to define if systems like firewalls and IDS/IPS or networking equipment that are between the tester and the final target are also part of the scope. Additional elements such as upstream providers, and other 3rd party providers should be identified and defined whether they are in scope or not.
What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?
Answer : C
While performing an assessment on a banking site, you discover the following link: hnps://mybank.com/xfer.aspMer_toMaccount_number]&amount-[dollars]
Assuming authenticated banking users can be lured to your web site, which crafted html tag may be used to launch a XSRF attack?
Answer : C
What concept do Rainbow Tables use to speed up password cracking?
Answer : D
Reference:
http://en.wikipedia.org/wiki/Space%E2%80%93time_tradeoff
You have connected to a Windows system remotely and have shell access via netcat.
While connected to the remote system you notice that some Windows commands work normally while others do not An example of this is shown in the picture below Which of the following best describes why tins is happening?
Answer : D
Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and
192.168.116.101. What factual conclusion can the tester draw from this output?
Answer : C
As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?
Answer : C
Where are Netcat's own network activity messages, such as when a connection occurs, sent?
Answer : A
Reference:
http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
How does OWASP ZAP function when used for performing web application assessments?
Answer : D