An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email m to obtain the CEO s login credentials Which of the following types of attacks is this an example of?
Correct Answer:B
Which of the following BEST explains why it is important to maintain confidentiality of any identified findings when performing a penetration test?
Correct Answer:C
A penetration tester has a full shell to a domain controller and wants to discover any user account that has not authenticated to the domain in 21 days. Which of the following commands would BEST accomplish this?
Correct Answer:B
A company contracted a firm specializing in penetration testing to assess the security of a core business application. The company provided the firm with a copy of the Java bytecode. Which of the following steps must the firm take before it can run a static code analyzer?
Correct Answer:D
Which of the following would be BEST for performing passive reconnaissance on a target's external domain?
Correct Answer:A
When performing compliance-based assessments, which of the following is the MOST important Key consideration?
Correct Answer:A