Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

After gaining access to a Linux system with a non-privileged account, a penetration tester identifies the following file:

Question # 41

Which of the following actions should the tester perform FIRST?

Options:

A.

Change the file permissions.


B.

Use privilege escalation.


C.

Cover tracks.


D.

Start a reverse shell.


Expert Solution
Questions # 42:

Which of the following concepts defines the specific set of steps and approaches that are conducted during a penetration test?

Options:

A.

Scope details


B.

Findings


C.

Methodology


D.

Statement of work


Expert Solution
Questions # 43:

A penetration tester breaks into a company's office building and discovers the company does not have a shredding service. Which of the following attacks should the penetration tester try next?

Options:

A.

Dumpster diving


B.

Phishing


C.

Shoulder surfing


D.

Tailgating


Expert Solution
Questions # 44:

During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?

Options:

A.

Vulnerability scanning


B.

Network segmentation


C.

System hardening


D.

Intrusion detection


Expert Solution
Questions # 45:

A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

Options:

A.

A handheld RF spectrum analyzer


B.

A mask and personal protective equipment


C.

Caution tape for marking off insecure areas


D.

A dedicated point of contact at the client


E.

The paperwork documenting the engagement


F.

Knowledge of the building's normal business hours


Expert Solution
Questions # 46:

When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because:

Options:

A.

security compliance regulations or laws may be violated.


B.

testing can make detecting actual APT more challenging.


C.

testing adds to the workload of defensive cyber- and threat-hunting teams.


D.

business and network operations may be impacted.


Expert Solution
Questions # 47:

An exploit developer is coding a script that submits a very large number of small requests to a web server until the server is compromised. The script must examine each response received and compare the data to a large number of strings to determine which data to submit next. Which of the following data structures should the exploit developer use to make the string comparison and determination as efficient as possible?

Options:

A.

A list


B.

A tree


C.

A dictionary


D.

An array


Expert Solution
Questions # 48:

During a security assessment, a penetration tester decides to implement a simple TCP port scanner to check the open ports from 1000 to 2000. Which of the following Python scripts would achieve this task?

Options:

A.

fori in range(1000, 2001): s = socket(AF_INET, SOCK_STREAM)

conn = s.connect_ex((host_IP, i))

if (conn == 0):

print(fPort {i} OPEN’)


B.

close ()


C.

fori in range(1001, 2000): s = socket(AF_INET, SOCK_STREAM) conn = s.connect—ex((host_IP, i)) if (conn == 0): print (f'Port {i} OPEN’) s.close ()


D.

fori in range(1000, 2001): s = socket(AF—INET, SOCK_DGRAM) conn = s.connect—ex((host_IP, i)) if (conn == 0): print(f’Port {i} OPEN’) s.close ()


E.

fori in range (1000, 2000): s = socket(SOCK_STREAM, AF_INET) conn = s.connect—ex((host—IP, i)) if (conn == 0): print (f'Port {i} OPEN') s.close()


Expert Solution
Questions # 49:

A penetration tester captures SMB network traffic and discovers that users are mistyping the name of a fileshare server. This causes the workstations to send out requests attempting to resolve the fileshare server's name. Which of the following is the best way for a penetration tester to exploit this situation?

Options:

A.

Relay the traffic to the real file server and steal documents as they pass through.


B.

Host a malicious file to compromise the workstation.


C.

Reply to the broadcasts with a fake IP address to deny access to the real file server.


D.

Respond to the requests with the tester's IP address and steal authentication credentials.


Expert Solution
Questions # 50:

Which of the following should be included in scope documentation?

Options:

A.

Service accounts


B.

Tester experience


C.

Disclaimer


D.

Number of tests


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions