Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions
Questions # 121:

A compliance-based penetration test is primarily concerned with:

Options:

A.

obtaining Pll from the protected network.


B.

bypassing protection on edge devices.


C.

determining the efficacy of a specific set of security standards.


D.

obtaining specific information from the protected network.


Expert Solution
Questions # 122:

Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?

Options:

A.

chmod u+x script.sh


B.

chmod u+e script.sh


C.

chmod o+e script.sh


D.

chmod o+x script.sh


Expert Solution
Questions # 123:

A penetration tester conducts an Nmap scan against a target and receives the following results:

Question # 123

Which of the following should the tester use to redirect the scanning tools using TCP port 1080 on the target?

Options:

A.

Nessus


B.

ProxyChains


C.

OWASPZAP


D.

Empire


Expert Solution
Questions # 124:

A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

Options:

A.

nmap192.168.1.1-5–PU22-25,80


B.

nmap192.168.1.1-5–PA22-25,80


C.

nmap192.168.1.1-5–PS22-25,80


D.

nmap192.168.1.1-5–Ss22-25,80


Expert Solution
Questions # 125:

Which of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?

Options:

A.

Shodan


B.

Nmap


C.

WebScarab-NG


D.

Nessus


Expert Solution
Questions # 126:

A penetration tester is assessing a wireless network. Although monitoring the correct channel and SSID, the tester is unable to capture a handshake between the clients and the AP. Which of the following attacks is the MOST effective to allow the penetration tester to capture a handshake?

Options:

A.

Key reinstallation


B.

Deauthentication


C.

Evil twin


D.

Replay


Expert Solution
Questions # 127:

Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

Options:

A.

Analyze the malware to see what it does.


B.

Collect the proper evidence and then remove the malware.


C.

Do a root-cause analysis to find out how the malware got in.


D.

Remove the malware immediately.


E.

Stop the assessment and inform the emergency contact.


Expert Solution
Questions # 128:

A penetration tester discovered a vulnerability that provides the ability to upload to a path via directory traversal. Some of the files that were discovered through this vulnerability are:

Question # 128

Which of the following is the BEST method to help an attacker gain internal access to the affected machine?

Options:

A.

Edit the discovered file with one line of code for remote callback


B.

Download .pl files and look for usernames and passwords


C.

Edit the smb.conf file and upload it to the server


D.

Download the smb.conf file and look at configurations


Expert Solution
Questions # 129:

During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.

INSTRUCTIONS

Analyze the code segments to determine which sections are needed to complete a port scanning script.

Drag the appropriate elements into the correct locations to complete the script.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 129


Expert Solution
Questions # 130:

A tester who is performing a penetration test on a website receives the following output:

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /var/www/search.php on line 62

Which of the following commands can be used to further attack the website?

Options:

A.

<script>var adr= ‘../evil.php?test=’ + escape(document.cookie);</script>


B.

../../../../../../../../../../etc/passwd


C.

/var/www/html/index.php;whoami


D.

1 UNION SELECT 1, DATABASE(),3--


Expert Solution
Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions