Multiple Choice
A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key findings are as follows: • The following request was intercepted going to the network device: GET /login HTTP/1.1 Host: 10.50.100.16 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Accept-Language: en-US,en;q=0.5 Connection: keep-alive Authorization: Basic WU9VUilOQU1FOnNlY3JldHBhc3N3b3jk • Network management interfaces are available on the production network. • An Nmap scan returned the following: Which of the following would be BEST to add to the recommendations section of the final report? (Choose two.)
A) Enforce enhanced password complexity requirements.
B) Disable or upgrade SSH daemon.
C) Disable HTTP/301 redirect configuration.
D) Create an out-of-band network for management.
E) Implement a better method for authentication.
F) Eliminate network management and control interfaces.
Correct Answer:

Verified
Correct Answer:
Verified
Q23: A penetration tester performs the following command:
Q24: A consultant is reviewing the following output
Q25: A penetration tester is testing input validation
Q26: An Nmap network scan has found five
Q27: Running a vulnerability scanner on a hybrid
Q29: A client wants a security assessment company
Q30: The results of an Nmap scan are
Q31: A penetration tester who is doing a
Q32: A company that developers embedded software for
Q33: A security engineer identified a new server