1. Right Answer: B
Explanation: OS creation is automated in larger environments in order to minimize the amount of busy work that they have to handle manually. Leaving password in documents is a necessary part of the installation process-either in plaintext or encoded in base64.
2. Right Answer: C
Explanation: Passing the Hash is an attack technique windows handles passwords makes it feasible to pass an encrypted hash to an authentication request instead of needing the plaintext password.
3. Right Answer: A
Explanation: It would be unethical to omit the findings. Omission of any findings is counterproductive to the purpose of a penetration test. Omission of any findings would be unethical and counterproductive to the purpose of a penetration test. Findings are far better to be over reported no matter how seemingly inconsequential. Information on vulnerabilities that is found on a given network, subnet, or system is provided by a penetration tester. Any information that turns into an action is determined based on a client.
4. Right Answer: A,B
Explanation: Creating Baseline is a pre-assessment phase of vulnerability assessment life-cycle in which a pentester or network administrator who is performing assessment identifies the nature of the corporate network, the applications, and services. He/she creates an inventory to all resources and assets that helps to manage, prioritize the assessment. Furthermore, he/she also maps the infrastructure, learns about the security controls, policies, and standards followed by the organization.
5. Right Answer: A
Explanation: SMB and NFS are common network storage protocols. As such, smb-enum-shares is an excellent candidate to further enumerate an SMB share. The nfs-showmount script identifies all shared directories as advertised by an NFS server, similar to the *nix showmount -e command, which identifies all directories on a local system that are being exported or made available to external systems.
Leave a comment