New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?

Options:

A.

RFID cloning


B.

RFID tagging


C.

Meta tagging


D.

Tag nesting


Expert Solution
Questions # 42:

A penetration tester logs in as a user in the cloud environment of a company. Which of the following Pacu modules will enable the tester to determine the level of access of the existing user?

Options:

A.

iam_enum_permissions


B.

iam_privesc_scan


C.

iam_backdoor_assume_role


D.

iam_bruteforce_permissions


Expert Solution
Questions # 43:

A penetration tester received a 16-bit network block that was scoped for an assessment. During the assessment, the tester realized no hosts were active in the provided block of IPs and reported this to the company. The company then provided an updated block of IPs to the tester. Which of the following would be the most appropriate NEXT step?

Options:

A.

Terminate the contract.


B.

Update the ROE with new signatures. Most Voted


C.

Scan the 8-bit block to map additional missed hosts.


D.

Continue the assessment.


Expert Solution
Questions # 44:

Performing a penetration test against an environment with SCADA devices brings additional safety risk because the:

Options:

A.

devices produce more heat and consume more power.


B.

devices are obsolete and are no longer available for replacement.


C.

protocols are more difficult to understand.


D.

devices may cause physical world effects.


Expert Solution
Questions # 45:

Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet?

Options:

A.

Unsupported operating systems


B.

Susceptibility to DDoS attacks


C.

Inability to network


D.

The existence of default passwords


Expert Solution
Questions # 46:

Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?

Options:

A.

Whether the cloud service provider allows the penetration tester to test the environment


B.

Whether the specific cloud services are being used by the application


C.

The geographical location where the cloud services are running


D.

Whether the country where the cloud service is based has any impeding laws


Expert Solution
Questions # 47:

Deconfliction is necessary when the penetration test:

Options:

A.

determines that proprietary information is being stored in cleartext.


B.

occurs during the monthly vulnerability scanning.


C.

uncovers indicators of prior compromise over the course of the assessment.


D.

proceeds in parallel with a criminal digital forensic investigation.


Expert Solution
Questions # 48:

A penetration tester who is performing a physical assessment of a company’s security practices notices the company does not have any shredders inside the office building. Which of the following techniques would be BEST to use to gain confidential information?

Options:

A.

Badge cloning


B.

Dumpster diving


C.

Tailgating


D.

Shoulder surfing


Expert Solution
Questions # 49:

A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active. Which of the following commands should be used to accomplish the goal?

Options:

A.

VRFY and EXPN


B.

VRFY and TURN


C.

EXPN and TURN


D.

RCPT TO and VRFY


Expert Solution
Questions # 50:

A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?

Options:

A.

Halt the penetration test.


B.

Contact law enforcement.


C.

Deconflict with the penetration tester.


D.

Assume the alert is from the penetration test.


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions