Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

A penetration tester is enumerating a Linux system. The goal is to modify the following script to provide more comprehensive system information:

#!/bin/bash

ps aux > > linux_enum.txt

Which of the following lines would provide the most comprehensive enumeration of the system?

Options:

A.

cat /etc/passwd > > linux_enum.txt; netstat -tuln > > linux_enum.txt; cat /etc/bash.bashrc > > linux_enum.txt


B.

whoami > > linux_enum.txt; uname -a > > linux_enum.txt; ifconfig > > linux_enum.txt


C.

hostname > > linux_enum.txt; echo $USER > > linux_enum.txt; curl ifconfig.me > > linux_enum.txt


D.

lsof -i > > linux_enum.txt; uname -a > > linux_enum.txt; ls /home/ > > linux_enum.txt


Expert Solution
Questions # 2:

Which of the following frameworks can be used to classify threats?

Options:

A.

PTES


B.

STRIDE


C.

OSSTMM


D.

OCTAVE


Expert Solution
Questions # 3:

A penetration tester assesses an application allow list and has limited command-line access on the Windows system. Which of the following would give the penetration tester information that could aid in continuing the test?

Options:

A.

mmc.exe


B.

icacls.exe


C.

nltest.exe


D.

rundll.exe


Expert Solution
Questions # 4:

A tester performs a vulnerability scan and identifies several outdated libraries used within the customer SaaS product offering. Which of the following types of scans did the tester use to identify the libraries?

Options:

A.

IAST


B.

SBOM


C.

DAST


D.

SAST


Expert Solution
Questions # 5:

Which of the following is the most likely LOLBin to be used to perform an exfiltration on a Microsoft Windows environment?

Options:

A.

procdump.exe


B.

msbuild.exe


C.

bitsadmin.exe


D.

cscript.exe


Expert Solution
Questions # 6:

A penetration tester has just started a new engagement. The tester is using a framework that breaks the life cycle into 14 components. Which of the following frameworks is the tester using?

Options:

A.

OWASP MASVS


B.

OSSTMM


C.

MITRE ATT & CK


D.

CREST


Expert Solution
Questions # 7:

A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?

Options:

A.

Smishing


B.

Impersonation


C.

Tailgating


D.

Whaling


Expert Solution
Questions # 8:

A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?

Options:

A.

MITRE ATT & CK


B.

OSSTMM


C.

CI/CD


D.

DREAD


Expert Solution
Questions # 9:

During a red-team exercise, a penetration tester obtains an employee ' s access badge. The tester uses the badge ' s information to create a duplicate for unauthorized entry. Which of the following best describes this action?

Options:

A.

Smurfing


B.

Credential stuffing


C.

RFID cloning


D.

Card skimming


Expert Solution
Questions # 10:

During host discovery, a security analyst wants to obtain GeoIP information and a comprehensive summary of exposed services. Which of the following tools is best for this task?

Options:

A.

WiGLE.net


B.

WHOIS


C.

theHarvester


D.

Censys.io


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions