Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?
Correct Answer:
A
A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)
Correct Answer:
AC
A penetration tester was contracted to test a proprietary application for buffer overflow vulnerabilities. Which of the following tools would be BEST suited for this task?
Correct Answer:
A
Which of the following tools provides Python classes for interacting with network protocols?
Correct Answer:
B
A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position.
Which of the following actions, if performed, would be ethical within the scope of the assessment?
Correct Answer:
B