[Tools and Code Analysis] While performing a penetration test, a tester executes the following command: PS c: \tools> c: \hacks \PsExec.exe \\server01.cor.ptia.org -accepteula cmd.exe Which of the following best explains what the tester is trying to do?
[Information Gathering and Vulnerability Scanning] A penetration tester needs to launch an Nmap scan to find the state of the port for both TCP and UDP services. Which of the following commands should the tester use?
[Information Gathering and Vulnerability Scanning] A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following Nmap scan output: Nmap scan report for some_host Host is up (0.01s latency). PORT STATE SERVICE 445/tcp open microsoft -ds Host script results: smb2 -security -mode: Message signing disabled Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?
[Attacks and Exploits] A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?
[Attacks and Exploits] During an assessment, a penetration tester gains a low -privilege shell and then runs the following command: findstr /SIM /C:"pass" *.txt *.cfg *.xml Which of the following is the penetration tester trying to enumerate?
[Attacks and Exploits] During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?