Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

During an assessment, a penetration tester gathered OSINT for one of the IT systems administrators from the target company and managed to obtain valuable information, including corporate email addresses. Which of the following techniques should the penetration tester perform NEXT?

Options:

A.

Badge cloning


B.

Watering-hole attack


C.

Impersonation


D.

Spear phishing


Expert Solution
Questions # 22:

Which of the following factors would a penetration tester most likely consider when testing at a location?

Options:

A.

Determine if visas are required.


B.

Ensure all testers can access all sites.


C.

Verify the tools being used are legal for use at all sites.


D.

Establish the time of the day when a test can occur.


Expert Solution
Questions # 23:

A penetration tester runs the following command:

l.comptia.local axfr comptia.local

which of the following types of information would be provided?

Options:

A.

The DNSSEC certificate and CA


B.

The DHCP scopes and ranges used on the network


C.

The hostnames and IP addresses of internal systems


D.

The OS and version of the DNS server


Expert Solution
Questions # 24:

Which of the following would a company's hunt team be MOST interested in seeing in a final report?

Options:

A.

Executive summary


B.

Attack TTPs


C.

Methodology


D.

Scope details


Expert Solution
Questions # 25:

A penetration tester uncovers access keys within an organization's source code management solution. Which of the following would BEST address the issue? (Choose two.)

Options:

A.

Setting up a secret management solution for all items in the source code management system


B.

Implementing role-based access control on the source code management system


C.

Configuring multifactor authentication on the source code management system


D.

Leveraging a solution to scan for other similar instances in the source code management system


E.

Developing a secure software development life cycle process for committing code to the source code management system


F.

Creating a trigger that will prevent developers from including passwords in the source code management system


Expert Solution
Questions # 26:

A penetration tester is testing a new version of a mobile application in a sandbox environment. To intercept and decrypt the traffic between the application and the external API, the tester has created a private root CA and issued a certificate from it. Even though the tester installed the root CA into the trusted stone of the smartphone used for the tests, the application shows an error indicating a certificate mismatch and does not connect to the server. Which of the following is the MOST likely reason for the error?

Options:

A.

TCP port 443 is not open on the firewall


B.

The API server is using SSL instead of TLS


C.

The tester is using an outdated version of the application


D.

The application has the API certificate pinned.


Expert Solution
Questions # 27:

A penetration tester captured the following traffic during a web-application test:

Question # 27

Which of the following methods should the tester use to visualize the authorization information being transmitted?

Options:

A.

Decode the authorization header using UTF-8.


B.

Decrypt the authorization header using bcrypt.


C.

Decode the authorization header using Base64.


D.

Decrypt the authorization header using AES.


Expert Solution
Questions # 28:

A physical penetration tester needs to get inside an organization's office and collect sensitive information without acting suspiciously or being noticed by the security guards. The tester has observed that the company's ticket gate does not scan the badges, and employees leave their badges on the table while going to the restroom. Which of the following techniques can the tester use to gain physical access to the office? (Choose two.)

Options:

A.

Shoulder surfing


B.

Call spoofing


C.

Badge stealing


D.

Tailgating


E.

Dumpster diving


F.

Email phishing


Expert Solution
Questions # 29:

A penetration tester learned that when users request password resets, help desk analysts change users' passwords to 123change. The penetration tester decides to brute force an internet-facing webmail to check which users are still using the temporary password. The tester configures the brute-force tool to test usernames found on a text file and the... Which of the following techniques is the penetration tester using?

Options:

A.

Password brute force attack


B.

SQL injection


C.

Password spraying


D.

Kerberoasting


Expert Solution
Questions # 30:

A company has recruited a penetration tester to conduct a vulnerability scan over the network. The test is confirmed to be on a known environment. Which of the following would be the BEST option to identify a system properly prior to performing the assessment?

Options:

A.

Asset inventory


B.

DNS records


C.

Web-application scan


D.

Full scan


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions