Which of the following documents describes specific activities, deliverables, and schedules for a penetration tester?
Correct Answer:C
A penetration tester received a .pcap file to look for credentials to use in an engagement. Which of the following tools should the tester utilize to open and read the .pcap file?
Correct Answer:B
A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company’s employees.
Which of the following tools can help the tester achieve this goal?
Correct Answer:A
Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?
Correct Answer:E
A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?
Correct Answer:D