Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

A penetration tester is performing a vulnerability scan on a large ATM network. One of the organization's requirements is that the scan does not affect legitimate clients' usage of the ATMs. Which of the following should the tester do to best meet the company's vulnerability scan requirements?

Options:

A.

Use Nmap's -T2 switch to run a slower scan and with less resources.


B.

Run the scans using multiple machines.


C.

Run the scans only during lunch hours.


D.

Use Nmap's -host-timeout switch to skip unresponsive targets.


Expert Solution
Questions # 72:

During an assessment of a web application, a penetration tester would like to test the application for blind SQL injection. Which of the following techniques should the penetration tester perform next?

Options:

A.

1" ORDER BY 1—+


B.

"; IF (1 = 1) WA1TFOR DELAY '0:0:10* —


C.

xyz' AND '!' = "1


D.

xyz' AND (SELECT CASE WHEN (1-1) THEN 1/0 ELSE *a* END)-'a)


Expert Solution
Questions # 73:

During a vulnerability scan a penetration tester enters the following Nmap command against all of the non-Windows clients:

nmap -sX -T4 -p 21-25, 67, 80, 139, 8080 192.168.11.191

The penetration tester reviews the packet capture in Wireshark and notices that the target responds with an RST packet flag set for all of the targeted ports. Which of the following does this information most likely indicate?

Options:

A.

All of the ports in the target range are closed.


B.

Nmap needs more time to scan the ports in the target range.


C.

The ports in the target range cannot be scanned because they are common UDP ports.


D.

All of the ports in the target range are open.


Expert Solution
Questions # 74:

An organization's Chief Information Security Officer debates the validity of a critical finding from a penetration assessment that was completed six months ago. Which of the following post-report delivery activities would have most likely prevented this scenario?

Options:

A.

Client acceptance


B.

Data destruction process


C.

Attestation of findings


D.

Lessons learned


Expert Solution
Questions # 75:

Which of the following legal concepts specifically outlines the scope, deliverables, and timelines of a project or engagement?

Options:

A.

MSA


B.

NDA


C.

SLA


D.

SOW


Expert Solution
Questions # 76:

A penetration tester managed to get control of an internal web server that is hosting the IT knowledge base. Which of the following attacks should the penetration tester attempt next?

Options:

A.

Vishing


B.

Watering hole


C.

Whaling


D.

Spear phishing


Expert Solution
Questions # 77:

A penetration tester is conducting an assessment on a web application. Which of the following active reconnaissance techniques would be best for the tester to use to gather additional information about the application?

Options:

A.

Using cURL with the verbose option


B.

Crawling UR Is using an interception proxy


C.

Using Scapy for crafted requests


D.

Crawling URIs using a web browser


Expert Solution
Questions # 78:

A penetration tester executes the following Nmap command and obtains the following output:

Question # 78

Which of the following commands would best help the penetration tester discover an exploitable service?

A)

Question # 78

B)

Question # 78

C)

Question # 78

D)

Question # 78

Options:

A.

nmap -v -p 25 -- soript smtp-enum-users remotehost


B.

nmap -v -- script=mysql-info.nse remotehost


C.

nmap --ocript=omb-brute.noe remotehoat


D.

nmap -p 3306 -- script "http*vuln*" remotehost


Expert Solution
Questions # 79:

In a standard engagement, a post-report document is provided outside of the report. This document:

• Does not contain specific findings

• Exposes vulnerabilities

• Can be shared publicly with outside parties that do not have an in-depth understanding about the client's network

Which of the following documents is described?

Options:

A.

Attestation letter


B.

Findings report


C.

Executive summary


D.

Non-disclosure agreement


Expert Solution
Questions # 80:

After obtaining a reverse shell connection, a penetration tester runs the following command: www-data@server!2:sudo -1

User www-data may run the following commands on serverl2: (root) NOPASSWD: /usr/bin/vi

Which of the following is the fastest way to escalate privileges on this server?

Options:

A.

Editing the file /etc/passwd to add a new user with uid0


B.

Creating a Bash script, saving it on the /tmp folder, andthen running it


C.

Executing the command sudo vi -c ' Jbash'


D.

Editing the file/etc/sudoers to allow any command


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions