New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following results:

Question # 21

Based on the output, which of the following services are MOST likely to be exploited? (Choose two.)

Options:

A.

Telnet


B.

HTTP


C.

SMTP


D.

DNS


E.

NTP


F.

SNMP


Expert Solution
Questions # 22:

During an assessment, a penetration tester gathered OSINT for one of the IT systems administrators from the target company and managed to obtain valuable information, including corporate email addresses. Which of the following techniques should the penetration tester perform NEXT?

Options:

A.

Badge cloning


B.

Watering-hole attack


C.

Impersonation


D.

Spear phishing


Expert Solution
Questions # 23:

A penetration tester gains access to a system and is able to migrate to a user process:

Question # 23

Given the output above, which of the following actions is the penetration tester performing? (Choose two.)

Options:

A.

Redirecting output from a file to a remote system


B.

Building a scheduled task for execution


C.

Mapping a share to a remote system


D.

Executing a file on the remote system


E.

Creating a new process on all domain systems


F.

Setting up a reverse shell from a remote system


G.

Adding an additional IP address on the compromised system


Expert Solution
Questions # 24:

A penetration tester is testing a new API for the company's existing services and is preparing the following script:

Question # 24

Which of the following would the test discover?

Options:

A.

Default web configurations


B.

Open web ports on a host


C.

Supported HTTP methods


D.

Listening web servers in a domain


Expert Solution
Questions # 25:

A penetration tester is conducting an engagement against an internet-facing web application and planning a phishing campaign. Which of the following is the BEST passive method of obtaining the technical contacts for the website?

Options:

A.

WHOIS domain lookup


B.

Job listing and recruitment ads


C.

SSL certificate information


D.

Public data breach dumps


Expert Solution
Questions # 26:

Penetration tester has discovered an unknown Linux 64-bit executable binary. Which of the following tools would be BEST to use to analyze this issue?

Options:

A.

Peach


B.

WinDbg


C.

GDB


D.

OllyDbg


Expert Solution
Questions # 27:

A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

Question # 27

Which of the following combinations of tools would the penetration tester use to exploit this script?

Options:

A.

Hydra and crunch


B.

Netcat and cURL


C.

Burp Suite and DIRB


D.

Nmap and OWASP ZAP


Expert Solution
Questions # 28:

The delivery of a penetration test within an organization requires defining specific parameters regarding the nature and types of exercises that can be conducted and when they can be conducted. Which of the following BEST identifies this concept?

Options:

A.

Statement of work


B.

Program scope


C.

Non-disclosure agreement


D.

Rules of engagement


Expert Solution
Questions # 29:

Which of the following is the BEST resource for obtaining payloads against specific network infrastructure products?

Options:

A.

Exploit-DB


B.

Metasploit


C.

Shodan


D.

Retina


Expert Solution
Questions # 30:

ion tester is attempting to get more people from a target company to download and run an executable. Which of the following would be the.. :tive way for the tester to achieve this objective?

Options:

A.

Dropping USB flash drives around the company campus with the file on it


B.

Attaching the file in a phishing SMS that warns users to execute the file or they will be locked out of their accounts


C.

Sending a pretext email from the IT department before sending the download instructions later


D.

Saving the file in a common folder with a name that encourages people to click it


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions