Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

During a penetration test, a tester attempts to pivot from one Windows 10 system to another Windows system. The penetration tester thinks a local firewall is blocking connections. Which of the following command-line utilities built into Windows is most likely to disable the firewall?

Options:

A.

certutil.exe


B.

bitsadmin.exe


C.

msconfig.exe


D.

netsh.exe


Expert Solution
Questions # 2:

A penetration testing team needs to determine whether it is possible to disrupt the wireless communications for PCs deployed in the client's offices. Which of the following techniques should the penetration tester leverage?

Options:

A.

Port mirroring


B.

Sidecar scanning


C.

ARP poisoning


D.

Channel scanning


Expert Solution
Questions # 3:

During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?

Options:

A.

Segmentation


B.

Mobile


C.

External


D.

Web


Expert Solution
Questions # 4:

An external legal firm is conducting a penetration test of a large corporation. Which of the following would be most appropriate for the legal firm to use in the subject line of a weekly email update?

Options:

A.

Privileged & Confidential Status Update


B.

Action Required Status Update


C.

Important Weekly Status Update


D.

Urgent Status Update


Expert Solution
Questions # 5:

Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?

Options:

A.

Creating registry keys


B.

Installing a bind shell


C.

Executing a process injection


D.

Setting up a reverse SSH connection


Expert Solution
Questions # 6:

A penetration tester is performing reconnaissance for a web application assessment. Upon investigation, the tester reviews the robots.txt file for items of interest.

INSTRUCTIONS

Select the tool the penetration tester should use for further investigation.

Select the two entries in the robots.txt file that the penetration tester should recommend for removal.

Question # 6


Expert Solution
Questions # 7:

A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:

xml

Copy code

<!DOCTYPE data [

]>

&foo;

Which of the following should the tester recommend in the report to best prevent this type of vulnerability?

Options:

A.

Drop all excessive file permissions with chmod o-rwx.


B.

Ensure the requests application access logs are reviewed frequently.


C.

Disable the use of external entities.


D.

Implement a WAF to filter all incoming requests.


Expert Solution
Questions # 8:

During a vulnerability assessment, a penetration tester configures the scanner sensor and performs the initial vulnerability scanning under the client's internal network. The tester later discusses the results with the client, but the client does not accept the results. The client indicates the host and assets that were within scope are not included in the vulnerability scan results. Which of the following should the tester have done?

Options:

A.

Rechecked the scanner configuration.


B.

Performed a discovery scan.


C.

Used a different scan engine.


D.

Configured all the TCP ports on the scan.


Expert Solution
Questions # 9:

A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following output:

kotlin

Copy code

Nmap scan report for some_host

Host is up (0.01 latency).

PORT STATE SERVICE

445/tcp open microsoft-ds

Host script results: smb2-security-mode: Message signing disabled

Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?

Options:

A.

responder -T eth0 -dwv ntlmrelayx.py -smb2support -tf


B.

msf > use exploit/windows/smb/ms17_010_psexec msf > msf > run


C.

hydra -L administrator -P /path/to/passwdlist smb://


D.

nmap —script smb-brute.nse -p 445


Expert Solution
Questions # 10:

During a pre-engagement activity with a new customer, a penetration tester looks for assets to test. Which of the following is an example of a target that can be used for testing?

Options:

A.

API


B.

HTTP


C.

IPA


D.

ICMP


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions