New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following describe the GREATEST concerns about using third-party open-source libraries in application code? (Choose two.)

Options:

A.

The libraries may be vulnerable


B.

The licensing of software is ambiguous


C.

The libraries’ code bases could be read by anyone


D.

The provenance of code is unknown


E.

The libraries may be unsupported


F.

The libraries may break the application


Expert Solution
Questions # 72:

An assessment has been completed, and all reports and evidence have been turned over to the client. Which of the following should be done NEXT to ensure the confidentiality of the client’s information?

Options:

A.

Follow the established data retention and destruction process


B.

Report any findings to regulatory oversight groups


C.

Publish the findings after the client reviews the report


D.

Encrypt and store any client information for future analysis


Expert Solution
Questions # 73:

A penetration tester is examining a Class C network to identify active systems quickly. Which of the following commands should the penetration tester use?

Options:

A.

nmap גsn 192.168.0.1/16


B.

nmap גsn 192.168.0.1-254


C.

nmap גsn 192.168.0.1 192.168.0.1.254


D.

nmap גsN 192.168.0.0/24


Expert Solution
Questions # 74:

A penetration tester found the following valid URL while doing a manual assessment of a web application: http://www.example.com/product.php?id=123987.

Which of the following automated tools would be best to use NEXT to try to identify a vulnerability in this URL?

Options:

A.

SQLmap


B.

Nessus


C.

Nikto


D.

DirBuster


Expert Solution
Questions # 75:

A penetration tester runs the following command:

l.comptia.local axfr comptia.local

which of the following types of information would be provided?

Options:

A.

The DNSSEC certificate and CA


B.

The DHCP scopes and ranges used on the network


C.

The hostnames and IP addresses of internal systems


D.

The OS and version of the DNS server


Expert Solution
Questions # 76:

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application. Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?

Options:

A.

SQLmap


B.

DirBuster


C.

w3af


D.

OWASP ZAP


Expert Solution
Questions # 77:

A penetration tester opened a shell on a laptop at a client's office but is unable to pivot because of restrictive ACLs on the wireless subnet. The tester is also aware that all laptop users have a hard-wired connection available at their desks. Which of the following is the BEST method available to pivot and gain additional access to the network?

Options:

A.

Set up a captive portal with embedded malicious code.


B.

Capture handshakes from wireless clients to crack.


C.

Span deauthentication packets to the wireless clients.


D.

Set up another access point and perform an evil twin attack.


Expert Solution
Questions # 78:

A penetration tester analyzed a web-application log file and discovered an input that was sent to the company's web application. The input contains a string that says "WAITFOR." Which of the following attacks is being attempted?

Options:

A.

SQL injection


B.

HTML injection


C.

Remote command injection


D.

DLL injection


Expert Solution
Questions # 79:

For a penetration test engagement, a security engineer decides to impersonate the IT help desk. The security engineer sends a phishing email containing an urgent request for users to change their passwords and a link to https://example.com/index.html. The engineer has designed the attack so that once the users enter the credentials, the index.html page takes the credentials and then forwards them to another server that the security engineer is controlling. Given the following information:

Question # 79

Which of the following lines of code should the security engineer add to make the attack successful?

Options:

A.

window.location.= 'https://evilcorp.com '


B.

crossDomain: true


C.

geturlparameter ('username')


D.

redirectUrl = 'https://example.com '


Expert Solution
Questions # 80:

A penetration tester will be performing a vulnerability scan as part of the penetration test on a client's website. The tester plans to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Which of the following Nmap options will the penetration tester MOST likely utilize?

Options:

A.

-а8 -T0


B.

--script "http*vuln*"


C.

-sn


D.

-O -A


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions