A penetration testing team wants to conduct DNS lookups for a set of targets provided by the client. The team crafts a Bash script for this task. However, they find a minor error in one line of the script:
1 #!/bin/bash
2 for i in $(cat example.txt); do
3 curl $i
4 done
Which of the following changes should the team make to line 3 of the script?
A. host $i
B. rndc $i
C. resolvconf $i
D. systemd-resolve $i
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities. Which of the following techniques should the tester use?
A. Banner grabbing
B. Ping sweeps
C. Sniffing
D. TCP/UDP scanning
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
While conducting a reconnaissance activity, a penetration tester extracts the following information:
Emails: - [email protected] - [email protected] - [email protected]
Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?
A. Likelihood of SQL injection attacks
B. Unauthorized access to the network
C. Exposure of sensitive servers to the internet
D. Indication of a data breach in the company
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
A penetration tester runs a vulnerability scan that identifies several issues across numerous customer hosts.
The executive report outlines the following:

The client is concerned about the availability of its consumer-facing production application. Which of the following hosts should the penetration tester select for additional manual testing?
A. Server 3
B. Server 1
C. Server 4
D. Server 2
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
A. Remove the persistence mechanisms.
B. Perform secure data destruction.
C. Spin down the infrastructure.
D. Preserve artifacts.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
A tester is finishing an engagement and needs to ensure that artifacts resulting from the test are safely handled. Which of the following is the best procedure for maintaining client data privacy?
A. Search through configuration files changed for sensitive credentials and remove them.
B. Remove configuration changes and any tools deployed to compromised systems.
C. Securely destroy or remove all engagement-related data from testing systems.
D. Shut down C2 and attacker infrastructure on premises and in the cloud.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
Aoyama -
サラリーマンのわしにとっては最高や!!Pass4Testさん、誠にありがとうございました!!!試験問題のほとんどがこの問題集に収めた