New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

SIMULATION

Using the output, identify potential attack vectors that should be further investigated.

Question # 81

Question # 81

Question # 81

Question # 81

Question # 81


Expert Solution
Questions # 82:

A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades- old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability. Which of the following should the penetration tester consider BEFORE running a scan?

Options:

A.

The timing of the scan


B.

The bandwidth limitations


C.

The inventory of assets and versions


D.

The type of scan


Expert Solution
Questions # 83:

After compromising a system, a penetration tester wants more information in order to decide what actions to take next. The tester runs the following commands:

Question # 83

Which of the following attacks is the penetration tester most likely trying to perform?

Options:

A.

Metadata service attack


B.

Container escape techniques


C.

Credential harvesting


D.

Resource exhaustion


Expert Solution
Questions # 84:

A company requires that all hypervisors have the latest available patches installed. Which of the following would BEST explain the reason why this policy is in place?

Options:

A.

To provide protection against host OS vulnerabilities


B.

To reduce the probability of a VM escape attack


C.

To fix any misconfigurations of the hypervisor


D.

To enable all features of the hypervisor


Expert Solution
Questions # 85:

Which of the following concepts defines the specific set of steps and approaches that are conducted during a penetration test?

Options:

A.

Scope details


B.

Findings


C.

Methodology


D.

Statement of work


Expert Solution
Questions # 86:

A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

Options:

A.

A handheld RF spectrum analyzer


B.

A mask and personal protective equipment


C.

Caution tape for marking off insecure areas


D.

A dedicated point of contact at the client


E.

The paperwork documenting the engagement


F.

Knowledge of the building's normal business hours


Expert Solution
Questions # 87:

A penetration tester is able to use a command injection vulnerability in a web application to get a reverse shell on a system After running a few commands, the tester runs the following:

python -c 'import pty; pty.spawn("/bin/bash")'

Which of the following actions Is the penetration tester performing?

Options:

A.

Privilege escalation


B.

Upgrading the shell


C.

Writing a script for persistence


D.

Building a bind shell


Expert Solution
Questions # 88:

A penetration tester writes the following script:

Question # 88

Which of the following is the tester performing?

Options:

A.

Searching for service vulnerabilities


B.

Trying to recover a lost bind shell


C.

Building a reverse shell listening on specified ports


D.

Scanning a network for specific open ports


Expert Solution
Questions # 89:

Which of the following is a regulatory compliance standard that focuses on user privacy by implementing the right to be forgotten?

Options:

A.

NIST SP 800-53


B.

ISO 27001


C.

GDPR


Expert Solution
Questions # 90:

Company.com has hired a penetration tester to conduct a phishing test. The tester wants to set up a fake log-in page and harvest credentials when target employees click on links in a phishing email. Which of the following commands would best help the tester determine which cloud email provider the log-in page needs to mimic?

Options:

A.

dig company.com MX


B.

whois company.com


C.

cur1 www.company.com


D.

dig company.com A


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions