Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions
Questions # 91:

A penetration tester noticed that an employee was using a wireless headset with a smartphone. Which of the following methods would be best to use to intercept the communications?

Options:

A.

Multiplexing


B.

Bluejacking


C.

Zero-day attack


D.

Smurf attack


Expert Solution
Questions # 92:

Which of the following is the most common vulnerability associated with loT devices that are directly connected to the internet?

Options:

A.

Unsupported operating systems


B.

Susceptibility to DDoS attacks


C.

Inability to network


D.

The existence of default passwords


Expert Solution
Questions # 93:

A penetration tester fuzzes an internal server looking for hidden services and applications and obtains the following output:

Question # 93

Which of the following is the most likely explanation for the output?

Options:

A.

The tester does not have credentials to access the server-status page.


B.

The admin directory cannot be fuzzed because it is forbidden.


C.

The admin, test, and db directories redirect to the log-in page.


D.

The robots.txt file has six entries in it.


Expert Solution
Questions # 94:

A penetration tester uses Hashcat to crack hashes discovered during a penetration test and obtains the following output:

ad09cd16529b5f5a40a3e15344e57649f4a43a267a97f008af01af803603c4c8 : Summer2023 !!

7945bb2bb08731fc8d57680ffa4aefec91c784d231de029c610b778eda5ef48b:p@ssWord123

ea88ceab69cb2fb8bdcf9ef4df884af219fffbffab473ec13f20326dc6f84d13: Love-You999

Which of the following is the best way to remediate the penetration tester's discovery?

Options:

A.

Requiring passwords to follow complexity rules


B.

Implementing a blocklist of known bad passwords


C.

Setting the minimum password length to ten characters


D.

Encrypting the passwords with a stronger algorithm


Expert Solution
Questions # 95:

A security professional wants to test an IoT device by sending an invalid packet to a proprietary service listening on TCP port 3011. Which of the following would allow the security professional to easily and programmatically manipulate the TCP header length and checksum using arbitrary numbers and to observe how the proprietary service responds?

Options:

A.

Nmap


B.

tcpdump


C.

Scapy


D.

hping3


Expert Solution
Questions # 96:

The attacking machine is on the same LAN segment as the target host during an internal penetration test. Which of the following commands will BEST enable the attacker to conduct host delivery and write the discovery to files without returning results of the attack machine?

Options:

A.

nmap snn exclude 10.1.1.15 10.1.1.0/24 oA target_txt


B.

nmap גiR10oX out.xml | grep גNmapג | cut d ג"f5 > live-hosts.txt


C.

nmap גPnsV OiL target.txt גA target_text_Service


D.

nmap גsSPn n iL target.txt גA target_txtl


Expert Solution
Questions # 97:

A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company’s employees.

Which of the following tools can help the tester achieve this goal?

Options:

A.

Metasploit


B.

Hydra


C.

SET


D.

WPScan


Expert Solution
Questions # 98:

Which of the following would MOST likely be included in the final report of a static application-security test that was written with a team of application developers as the intended audience?

Options:

A.

Executive summary of the penetration-testing methods used


B.

Bill of materials including supplies, subcontracts, and costs incurred during assessment


C.

Quantitative impact assessments given a successful software compromise


D.

Code context for instances of unsafe type-casting operations


Expert Solution
Questions # 99:

A penetration tester is attempting to discover live hosts on a subnet quickly.

Which of the following commands will perform a ping scan?

Options:

A.

nmap -sn 10.12.1.0/24


B.

nmap -sV -A 10.12.1.0/24


C.

nmap -Pn 10.12.1.0/24


D.

nmap -sT -p- 10.12.1.0/24


Expert Solution
Questions # 100:

A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?

Options:

A.

ROE


B.

SLA


C.

MSA


D.

NDA


Expert Solution
Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions