Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

A penetration tester wants to collect credentials against an organization with a PEAP infrastructure. Which of the following tools should the tester use?

Options:

A.

InSSIDer


B.

HackRF One


C.

WiFi-Pumpkin


D.

Aircrack-ng


Expert Solution
Questions # 2:

In a file stored in an unprotected source code repository, a penetration tester discovers the following line of code:

sshpass -p donotchange ssh admin@192.168.6.14

Which of the following should the tester attempt to do next to take advantage of this information? (Select two).

Options:

A.

Use Nmap to identify all the SSH systems active on the network.


B.

Take a screen capture of the source code repository for documentation purposes.


C.

Investigate to find whether other files containing embedded passwords are in the code repository.


D.

Confirm whether the server 192.168.6.14 is up by sending ICMP probes.


E.

Run a password-spraying attack with Hydra against all the SSH servers.


F.

Use an external exploit through Metasploit to compromise host 192.168.6.14.


Expert Solution
Questions # 3:

A tester needs to begin capturing WLAN credentials for cracking during an on-site engagement. Which of the following is the best command to capture handshakes?

Options:

A.

tcpdump -n -s0 -w -i


B.

airserv-ng -d


C.

aireplay-ng -0 1000 -a


D.

airodump-ng -c 6 --bssid


Expert Solution
Questions # 4:

A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?

Options:

A.

Quality control


B.

Methodology


C.

Executive summary


D.

Risk scoring


Expert Solution
Questions # 5:

A company's incident response team determines that a breach occurred because a penetration tester left a web shell. Which of the following should the penetration tester have done after the engagement?

Options:

A.

Enable a host-based firewall on the machine


B.

Remove utilized persistence mechanisms on client systems


C.

Revert configuration changes made during the engagement


D.

Turn off command-and-control infrastructure


Expert Solution
Questions # 6:

A penetration tester gains shell access to a Windows host. The tester needs to permanently turn off protections in order to install additional payload. Which of the following commands is most appropriate?

Options:

A.

sc config start=disabled


B.

sc query state= all


C.

pskill


D.

net config


Expert Solution
Questions # 7:

A tester is performing an external phishing assessment on the top executives at a company. Two-factor authentication is enabled on the executives’ accounts that are in the scope of work. Which of the following should the tester do to get access to these accounts?

Options:

A.

Configure an external domain using a typosquatting technique. Configure Evilginx to bypass two-factor authentication using a phishlet that simulates the mail portal for the company.


B.

Configure Gophish to use an external domain. Clone the email portal web page from the company and get the two-factor authentication code using a brute-force attack method.


C.

Configure an external domain using a typosquatting technique. Configure SET to bypass two-factor authentication using a phishlet that mimics the mail portal for the company.


D.

Configure Gophish to use an external domain. Clone the email portal web page from the company and get the two-factor authentication code using a vishing method.


Expert Solution
Questions # 8:
Options:

A.

A generative AI assistant


B.

The customer's designated contact


C.

A cybersecurity industry peer


D.

A team member


Expert Solution
Questions # 9:

A penetration tester uses the Intruder tool from the Burp Suite Community Edition while assessing a web application. The tester notices the test is taking too long to complete. Which of the following tools can the tester use to accelerate the test and achieve similar results?

Options:

A.

TruffleHog


B.

Postman


C.

Wfuzz


D.

WPScan


Expert Solution
Questions # 10:

During a security audit, a penetration tester wants to run a process to gather information about a target network's domain structure and associated IP addresses. Which of the following tools should the tester use?

Options:

A.

Dnsenum


B.

Nmap


C.

Netcat


D.

Wireshark


Expert Solution
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions