Question 6 of 79

Which of the following TCP packet sequences are common during a SYN (or half-open) scan?

    Correct Answer: C

Question 7 of 79

Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?

    Correct Answer: D

Question 8 of 79

You have gained shell on a Windows host and want to find other machines to pivot to, but the rules of engagement state that you can only use tools that are already available. How could you find other machines on the target network?

    Correct Answer: B

    The 'ping' utility in a for loop can effectively sweep the network to discover other machines. By systematically sending ping requests to a range of IP addresses, you can identify which machines are active and responding. This method leverages a tool (ping) that is typically pre-installed on a Windows host and complies with the rule of using only available tools.

Question 9 of 79

A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?

    Correct Answer: D

Question 10 of 79

What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

    Correct Answer: D

    The section of a penetration test or ethical hacking engagement final report used to detail and prioritize the results of your testing is the 'Findings' section. This part of the report summarizes the discovered vulnerabilities, their impact, and prioritizes them based on their severity, helping stakeholders understand the critical areas that need immediate attention.