IT Questions Bank A penetration tester runs the Nmap NSE script nmap –script smtp-open-relay.nse 10.0.0.1 command on a Kali Linux PC. What is the purpose of running this script?ITExamAnswers asked 10 months ago • Ethical HackerRefer to the exhibit. A penetration is being prepared to run the EternalBlue exploit using Metasploit against a target with an IP address of 10.0.0.1/8 from the source PC with an IP address of 10.0.0.111/8. What two commands must be entered before the exploit command can be run? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerAn organization wants to test its vulnerability to an employee with network privileges accessing the network maliciously. Which type of penetration test should be used to test this vulnerability?ITExamAnswers asked 10 months ago • Ethical HackerWhich three practices are commonly adopted when setting up a penetration testing lab environment? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerMatch penetration testing methodology and standard with the respective description.ITExamAnswers asked 10 months ago • Ethical HackerA cybersecurity firm has been hired by an organization to perform penetration tests. The tests require a secure method of transferring data over a network. Which two protocols could be used to accomplish this task? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat can be used to document the testing timeline in a rules of engagement document?ITExamAnswers asked 10 months ago • Ethical HackerWhich two elements are typically on the front of a credit card? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerMatch the healthcare sector term to the respective description.ITExamAnswers asked 10 months ago • Ethical HackerWhy would an organization hire a red team?ITExamAnswers asked 10 months ago • Ethical HackerWhy should a tester use query throttling techniques when running an authorized penetration test on a live network?ITExamAnswers asked 10 months ago • Ethical HackerWhich common tool is used by penetration testers to craft packets?ITExamAnswers asked 10 months ago • Ethical HackerA penetration tester runs the command nmap -sF -p 80 192.168.1.1 against a Windows host and receives a response RST packet. What conclusion can be drawn on the status of port 80?ITExamAnswers asked 10 months ago • Ethical HackerA penetration tester wants to quickly discover all the live hosts on the 192.168.0.0/24 network. Which command can do the ping sweep using the nmap tool?ITExamAnswers asked 10 months ago • Ethical HackerA network administrator performs a penetration test for a company that sells computer parts through an online storefront. The first step is to discover who owns the domain name that the company is using. Which penetration testing tool can be used to do this?ITExamAnswers asked 10 months ago • Ethical Hacker