1. Right Answer: D
Explanation: To understand the Session Fixation attack better, let-s consider a scenario where there is an attacker, a victim, and the web server. Attacker initiates a legitimate connection with the web server and issues a session ID or uses a new session I The attacker then sends the link to the victim with the established session ID for bypassing the authentication. When the user clicks the link and attempts to log into the website, web server continues the session as it is already established and authentication is performe
2. Right Answer: D
Explanation: Host-based IPS/IDS is normally deployed for the protection of specific host machine, and it works closely with the Operating System Kernel of the host machine.
3. Right Answer: B
Explanation: The best recommended mitigation strategy for passwords being stored in plaintext is encryption. An organization-s security posture is weakened by storing passwords in plaintext through both simplification of lateral movement for a theoretical adversary and elimination of the concept of non-repudiation and verification of individuals responsible for actions under a given username.
4. Right Answer: C
Explanation: The identification of a running reverse shell , or the discovery of any other evidence of a previous breach of a target network grounds to notify the client and immediately halt testing. Staying in your lane is important when conducting a penetration test; It is a forensics task to identify the culprit of a security breach, a forensic analysis performing tools and knowledge is markedly distinct from those used in penetration testing.
5. Right Answer: B
Explanation: An organization-s security posture is weakened by unnecessary open services. The viable attack surface is increased without a business need; encouraging hardening of the target system mitigates this finding in the best way possible.