ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 199 - PT0-002 discussion

Report
Export

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?

A.
Run an application vulnerability scan and then identify the TCP ports used by the application.
Answers
A.
Run an application vulnerability scan and then identify the TCP ports used by the application.
B.
Run the application attached to a debugger and then review the application's log.
Answers
B.
Run the application attached to a debugger and then review the application's log.
C.
Disassemble the binary code and then identify the break points.
Answers
C.
Disassemble the binary code and then identify the break points.
D.
Start a packet capture with Wireshark and then run the application.
Answers
D.
Start a packet capture with Wireshark and then run the application.
Suggested answer: D
asked 02/10/2024
Emmanuel Aminu
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first