New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

You are a penetration tester reviewing a client’s website through a web browser.

INSTRUCTIONS

Review all components of the website through the browser to determine if vulnerabilities are present.

Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 61

Question # 61

Question # 61

Question # 61

Question # 61

Question # 61

Question # 61


Expert Solution
Questions # 62:

A red team gained access to the internal network of a client during an engagement and used the Responder tool to capture important data. Which of the following was captured by the testing team?

Options:

A.

Multiple handshakes


B.

IP addresses


C.

Encrypted file transfers


D.

User hashes sent over SMB


Expert Solution
Questions # 63:

A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?

Options:

A.

ROE


B.

SLA


C.

MSA


D.

NDA


Expert Solution
Questions # 64:

A consultant is reviewing the following output after reports of intermittent connectivity issues:

? (192.168.1.1) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet]

? (192.168.1.12) at 34:a4:be:09:44:f4 on en0 ifscope [ethernet]

? (192.168.1.17) at 92:60:29:12:ac:d2 on en0 ifscope [ethernet]

? (192.168.1.34) at 88:de:a9:12:ce:fb on en0 ifscope [ethernet]

? (192.168.1.136) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet]

? (192.168.1.255) at ff:ff:ff:ff:ff:ff on en0 ifscope [ethernet]

? (224.0.0.251) at 01:02:5e:7f:ff:fa on en0 ifscope permanent [ethernet]

? (239.255.255.250) at ff:ff:ff:ff:ff:ff on en0 ifscope permanent [ethernet]

Which of the following is MOST likely to be reported by the consultant?

Options:

A.

A device on the network has an IP address in the wrong subnet.


B.

A multicast session was initiated using the wrong multicast group.


C.

An ARP flooding attack is using the broadcast address to perform DDoS.


D.

A device on the network has poisoned the ARP cache.


Expert Solution
Questions # 65:

A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report?

Options:

A.

Add a dependency checker into the tool chain.


B.

Perform routine static and dynamic analysis of committed code.


C.

Validate API security settings before deployment.


D.

Perform fuzz testing of compiled binaries.


Expert Solution
Questions # 66:

The attacking machine is on the same LAN segment as the target host during an internal penetration test. Which of the following commands will BEST enable the attacker to conduct host delivery and write the discovery to files without returning results of the attack machine?

Options:

A.

nmap snn exclude 10.1.1.15 10.1.1.0/24 oA target_txt


B.

nmap גiR10oX out.xml | grep גNmapג | cut d ג"f5 > live-hosts.txt


C.

nmap גPnsV OiL target.txt גA target_text_Service


D.

nmap גsSPn n iL target.txt גA target_txtl


Expert Solution
Questions # 67:

Which of the following types of information should be included when writing the remediation section of a penetration test report to be viewed by the systems administrator and technical staff?

Options:

A.

A quick description of the vulnerability and a high-level control to fix it


B.

Information regarding the business impact if compromised


C.

The executive summary and information regarding the testing company


D.

The rules of engagement from the assessment


Expert Solution
Questions # 68:

A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client’s requirements?

Options:

A.

“cisco-ios” “admin+1234”


B.

“cisco-ios” “no-password”


C.

“cisco-ios” “default-passwords”


D.

“cisco-ios” “last-modified”


Expert Solution
Questions # 69:

A consulting company is completing the ROE during scoping.

Which of the following should be included in the ROE?

Options:

A.

Cost ofthe assessment


B.

Report distribution


C.

Testing restrictions


D.

Liability


Expert Solution
Questions # 70:

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?

Options:

A.

Alternate data streams


B.

PowerShell modules


C.

MP4 steganography


D.

PsExec


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions