Q1. During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?
A.Smurfing
B. Credential stuffing
C. RFID cloning
D. Card skimming
Correct Answer: C
Q2. A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?
A.Browser Exploitation Framework
B. Maltego
C. Metasploit
D. theHarvester
Correct Answer: A
Q3. A penetration tester wants to create a malicious QR code to assist with a physical security assessment. Which of the following tools has the built-in functionality most likely needed for this task?
A.BeEF
B. John the Ripper
C. ZAP
D. Evilginx
Correct Answer: A
Q4. A penetration tester is conducting reconnaissance for an upcoming assessment of a large corporate client. The client authorized spear phishing in the rules of engagement. Which of the following should the tester do first when developing the phishing campaign?
A.Shoulder surfing
B. Recon-ng
C. Social media
D. Password dumps
Correct Answer: C
$ 39
Reviews
There are no reviews yet.