New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

A security firm is discussing the results of a penetration test with the client. Based on the findings, the client wants to focus the remaining time on a critical network segment. Which of the following BEST describes the action taking place?

Options:

A.

Maximizing the likelihood of finding vulnerabilities


B.

Reprioritizing the goals/objectives


C.

Eliminating the potential for false positives


D.

Reducing the risk to the client environment


Expert Solution
Questions # 32:

A penetration tester who is working remotely is conducting a penetration test using a wireless connection. Which of the following is the BEST way to provide confidentiality for the client while using this connection?

Options:

A.

Configure wireless access to use a AAA server.


B.

Use random MAC addresses on the penetration testing distribution.


C.

Install a host-based firewall on the penetration testing distribution.


D.

Connect to the penetration testing company's VPS using a VPN.


Expert Solution
Questions # 33:

A penetration tester is conducting a penetration test and discovers a vulnerability on a web server that is owned by the client. Exploiting the vulnerability allows the tester to open a reverse shell. Enumerating the server for privilege escalation, the tester discovers the following:

Question # 33

Which of the following should the penetration tester do NEXT?

Options:

A.

Close the reverse shell the tester is using.


B.

Note this finding for inclusion in the final report.


C.

Investigate the high numbered port connections.


D.

Contact the client immediately.


Expert Solution
Questions # 34:

A company conducted a simulated phishing attack by sending its employees emails that included a link to a site that mimicked the corporate SSO portal. Eighty percent of the employees who received the email clicked the link and provided their corporate credentials on the fake site. Which of the following recommendations would BEST address this situation?

Options:

A.

Implement a recurring cybersecurity awareness education program for all users.


B.

Implement multifactor authentication on all corporate applications.


C.

Restrict employees from web navigation by defining a list of unapproved sites in the corporate proxy.


D.

Implement an email security gateway to block spam and malware from email communications.


Expert Solution
Questions # 35:

A penetration tester completed an assessment, removed all artifacts and accounts created during the test, and presented the findings to the client. Which of the following happens NEXT?

Options:

A.

The penetration tester conducts a retest.


B.

The penetration tester deletes all scripts from the client machines.


C.

The client applies patches to the systems.


D.

The client clears system logs generated during the test.


Expert Solution
Questions # 36:

A company has hired a penetration tester to deploy and set up a rogue access point on the network.

Which of the following is the BEST tool to use to accomplish this goal?

Options:

A.

Wireshark


B.

Aircrack-ng


C.

Kismet


D.

Wifite


Expert Solution
Questions # 37:

A penetration tester received a .pcap file to look for credentials to use in an engagement.

Which of the following tools should the tester utilize to open and read the .pcap file?

Options:

A.

Nmap


B.

Wireshark


C.

Metasploit


D.

Netcat


Expert Solution
Questions # 38:

A client has requested that the penetration test scan include the following UDP services: SNMP, NetBIOS, and DNS. Which of the following Nmap commands will perform the scan?

Options:

A.

nmap –vv sUV –p 53, 123-159 10.10.1.20/24 –oA udpscan


B.

nmap –vv sUV –p 53,123,161-162 10.10.1.20/24 –oA udpscan


C.

nmap –vv sUV –p 53,137-139,161-162 10.10.1.20/24 –oA udpscan


D.

nmap –vv sUV –p 53, 122-123, 160-161 10.10.1.20/24 –oA udpscan


Expert Solution
Questions # 39:

You are a security analyst tasked with hardening a web server.

You have been given a list of HTTP payloads that were flagged as malicious.

INSTRUCTIONS

Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 39


Expert Solution
Questions # 40:

Which of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?

Options:

A.

Shodan


B.

Nmap


C.

WebScarab-NG


D.

Nessus


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions