1. Right Answer: C
Explanation: The use of shared local administrator credentials and passwords being stored in plaintext makes lateral movement easier for adversaries, obfuscating their activities and leading to conflicts regarding who is responsible for actions under a given username. These findings are best mitigated, respectively, by the use of local account password randomization and by the encryption of passwords when they are at rest and in transit.
2. Right Answer: A
Explanation: Screenshots provide evidence that can grossly simplify the matter of providing attestation of findings discovered during the course of a penetration test. Providing an affidavit or other document having the discovered findings is one thing, but hard evidence always speaks louder than words.
3. Right Answer: B
Explanation: Directory traversal is an HTTP attack in which the access of restricted directories is allowed, and the commands are executed outside the root directory of the web server-s commands. This vulnerability can exist either in the web application code or the web server software itself.
4. Right Answer: B
Explanation: Web server-s administrator uses access control list of users or groups authorized to access, execute or modify particular files on the server and for the other access rights.
5. Right Answer: B
Explanation: Hard coding is the software development practice of embedding data directly into the source code of a program or other executable object, as opposed to obtaining the data from external sources or generating it at run-time.