Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

A penetration tester issues the following command after obtaining a low-privilege reverse shell: wmic service get name,pathname,startmode

Which of the following is the most likely reason the penetration tester ran this command?

Options:

A.

To search for passwords in the service directory


B.

To list scheduled tasks that may be exploitable


C.

To register a service to run as System


D.

To find services that have unquoted service paths


Expert Solution
Questions # 62:

A penetration tester is conducting an assessment of an organization that has both a web and mobile application. While testing the user profile page, the penetration tester notices that additional data is returned in the API response, which is not displayed in the web user interface. Which of the following is the most effective technique to extract sensitive user data?

Options:

A.

Compare PI I from data leaks to publicly exposed user profiles.


B.

Target the user profile page with a denial-of-service attack.


C.

Target the user profile page with a reflected XSS attack.


D.

Compare the API response fields to GUI fields looking for PH.


Expert Solution
Questions # 63:

A penetration tester is taking screen captures of hashes obtained from a domain controller. Which of the following best explains why the penetration tester should immediately obscure portions of the images before saving?

Options:

A.

To maintain confidentiality of data/information


B.

To avoid disclosure of how the hashes were obtained


C.

To make the hashes appear shorter and easier to crack


D.

To prevent analysis based on the type of hash


Expert Solution
Questions # 64:

Which of the following components should a penetration tester most likely include in a report at the end of an assessment?

Options:

A.

Metrics and measures


B.

Client interviews


C.

Compliance information


D.

Business policies


Expert Solution
Questions # 65:

Which of the following tools can a penetration tester use to brute force a user password over SSH using multiple threads?

Options:

A.

CeWL


B.

John the Ripper


C.

Hashcat


D.

Hydra


Expert Solution
Questions # 66:

A penetration testing firm wants to hire three additional consultants to support a newly signed long-term contract with a major customer. The following is a summary of candidate

background checks:

Question # 66

Which of the following candidates should most likely be excluded from consideration?

Options:

A.

Candidate 1


B.

Candidate 2


C.

Candidate 3


D.

Candidate 4


Expert Solution
Questions # 67:

During an engagement, a penetration tester was able to upload to a server a PHP file with the following content:

Which of the following commands should the penetration tester run to successfully achieve RCE?

Options:

A.

python3 -c "import requests;print (requests.post (url='http://172.16.200.10/uploads/shell.php ', data={'cmd=id'}))"


B.

python3 -c "import requests;print (requests.post(url='http://172.16.200.10/uploads/shell.php ', data=

('cmd':'id') ) .text) "


C.

python3 -c "import requests;print (requests.get (url='http://172.16.200.10/uploads/shell.php ', params=

{'cmd':'id'}) )"


D.

python3 -c "import requests;print (requests.get (url='http://172.16.200.10/uploads/shell.php ', params=

('cmd':'id'}) .text) "


Expert Solution
Questions # 68:

Within a Python script, a line that states print (var) outputs the following:

[{'1' : 'CentOS', '2' : 'Ubuntu'), {'1' : 'Windows 10', '2' : 'Windows Server 2016'}]

Which of the following objects or data structures is var ?

Options:

A.

An array


B.

A class


C.

A dictionary


D.

A list


Expert Solution
Questions # 69:

A penetration tester has compromised a customer's internal network, gaining access to a file server that hosts email server backups. Which of the following is the best tool to assist with data exfiltration?

Options:

A.

SFTP


B.

Nmap


C.

Netcat


D.

SCP


Expert Solution
Questions # 70:

A security consultant wants to perform a vulnerability assessment with an application that can effortlessly generate an easy-to-read report. Which of the following should the attacker use?

Options:

A.

Brakeman


B.

Nessus


C.

Metasploit


D.

SCAP


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions