-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CompTIA PenTest+ Study Guide
By :
You can find the answers in the Appendix.
Alice discovers a rating that her vulnerability scanner lists as 9.3 out of 10 on its severity scale. The service that is identified runs on TCP 445. What type of exploit is Alice most likely to use on this service?
MIB exploit
Use the following scenario for questions 2 through 4.
Charles has recently completed a vulnerability scan of a system, and needs to select the best vulnerability to exploit from the following listing:

Which of the entries should Charles prioritize from this list if he wants to gain access to the system?
If Charles wants to build a list of additional system user accounts, which of the vulnerabilities is most likely to deliver that information?
Change the font size
Change margin width
Change background colour