Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

A penetration tester has been hired to examine a website for flaws. During one of the time windows for testing, a network engineer notices a flood of GET requests to the web server, reducing the website’s response time by 80%. The network engineer contacts the penetration tester to determine if these GET requests are part of the test. Which of the following BEST describes the purpose of checking with the penetration tester?

Options:

A.

Situational awareness


B.

Rescheduling


C.

DDoS defense


D.

Deconfliction


Expert Solution
Questions # 12:

Which of the following situations would require a penetration tester to notify the emergency contact for the engagement?

Options:

A.

The team exploits a critical server within the organization.


B.

The team exfiltrates PII or credit card data from the organization.


C.

The team loses access to the network remotely.


D.

The team discovers another actor on a system on the network.


Expert Solution
Questions # 13:

A penetration tester who is performing an engagement notices a specific host is vulnerable to EternalBlue. Which of the following would BEST protect against this vulnerability?

Options:

A.

Network segmentation


B.

Key rotation


C.

Encrypted passwords


D.

Patch management


Expert Solution
Questions # 14:

Penetration tester is developing exploits to attack multiple versions of a common software package. The versions have different menus and )ut.. they have a common log-in screen that the exploit must use. The penetration tester develops code to perform the log-in that can be each of the exploits targeted to a specific version. Which of the following terms is used to describe this common log-in code example?

Options:

A.

Conditional


B.

Library


C.

Dictionary


D.

Sub application


Expert Solution
Questions # 15:

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

Question # 15

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?

Options:

A.

Run an application vulnerability scan and then identify the TCP ports used by the application.


B.

Run the application attached to a debugger and then review the application's log.


C.

Disassemble the binary code and then identify the break points.


D.

Start a packet capture with Wireshark and then run the application.


Expert Solution
Questions # 16:

A penetration tester opened a shell on a laptop at a client's office but is unable to pivot because of restrictive ACLs on the wireless subnet. The tester is also aware that all laptop users have a hard-wired connection available at their desks. Which of the following is the BEST method available to pivot and gain additional access to the network?

Options:

A.

Set up a captive portal with embedded malicious code.


B.

Capture handshakes from wireless clients to crack.


C.

Span deauthentication packets to the wireless clients.


D.

Set up another access point and perform an evil twin attack.


Expert Solution
Questions # 17:

Which of the following documents must be signed between the penetration tester and the client to govern how any provided information is managed before, during, and after the engagement?

Options:

A.

MSA


B.

NDA


C.

SOW


D.

ROE


Expert Solution
Questions # 18:

Which of the following documents is agreed upon by all parties associated with the penetration-testing engagement and defines the scope, contacts, costs, duration, and deliverables?

Options:

A.

SOW


B.

SLA


C.

MSA


D.

NDA


Expert Solution
Questions # 19:

During enumeration, a red team discovered that an external web server was frequented by employees. After compromising the server, which of the following attacks would best support ------------company systems?

Options:

A.

Aside-channel attack


B.

A command injection attack


C.

A watering-hole attack


D.

A cross-site scripting attack


Expert Solution
Questions # 20:

Which of the following OSSTM testing methodologies should be used to test under the worst conditions?

Options:

A.

Tandem


B.

Reversal


C.

Semi-authorized


D.

Known environment


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions